Cisco Cisco Packet Data Gateway (PDG) Prospecto
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
IPSec Network Applications
▀ Implementing IPSec for PDN Access Applications
▄ Cisco StarOS IP Security (IPSec) Reference
32
Implementing IPSec for PDN Access Applications
This section provides information on the following topics:
This section assumes that ISAKMP crypto maps are used as opposed to manual crypto maps.
How IPSec-based PDN Access Configuration Works
The following figure and the text that follows describe how sessions accessing a PDN using IPSec are processed by
StarOS.
StarOS.
Figure 2.
IPSec PDN Access Processing
Table 2. IPSec PDN Access Processing
Step
Description
1
A subscriber session or PDP context Request, in GGSN service, arrives at the system.
2
The system processes the subscriber session or request as it would typically.
3
Prior to routing the session packets, the system compares them against configured Access Control Lists (ACLs).
4
The system determines that the packet matches the criteria of an ACL that is associated with a configured crypto map.