Cisco Cisco Packet Data Interworking Function (PDIF)
IPSec Network Applications
▀ Implementing IPSec for PDN Access Applications
▄ IPSec Reference, StarOS Release 18
32
Implementing IPSec for PDN Access Applications
This section provides information on the following topics:
This section assumes that ISAKMP crypto maps are used as opposed to manual crypto maps.
How IPSec-based PDN Access Configuration Works
The following figure and the text that follows describe how sessions accessing a PDN using IPSec are processed by
StarOS.
StarOS.
Figure 2.
IPSec PDN Access Processing
Table 2. IPSec PDN Access Processing
Step
Description
1
A subscriber session or PDP context Request, in GGSN service, arrives at the system.
2
The system processes the subscriber session or request as it would typically.
3
Prior to routing the session packets, the system compares them against configured Access Control Lists (ACLs).
4
The system determines that the packet matches the criteria of an ACL that is associated with a configured crypto map.