(1. IPSec overview: Provided functions: 1. Before starting to transmit information, both sides will verify each other's identity. 2. Acknowledge whether the data has been intercepted and modified during transmission, and acknowledge the integrity of the information. 3. Encrypt the transmitted information. Before the transmission, the two computers negotiate a result - SA (safety related), just like a contract. It includes the key used to verify identity and information encryption, secure communication protocol, SPI (Security Parameter Index) and other information, and the two sides communicate according to their content. The method of negotiation is standard IKE (Key Exchange). After the implementation can communicate.)