A manual tunnel is the basic tunnel type defined by the IPSec standards.

In theory, it should be possible to connect to any IPSec-compliant system using a manual tunnel configuration. However, whether this holds true depends largely upon whether compatible tunnel parameters can be found.

According to IBM RedBook SG24-5201-00: A Comprehensive Guide to Virtual Private Networks, Volume I: IBM Firewall, Server and Client Solutions, manual tunnel connections have been successfully tested with the following IPSec platforms:

Note: 'SecureWay' is a rebranding of the 'eNetwork' product line. The two brand names should be considered interchangeable.

The main limitations of manual tunnels are:

  1. The tunnel endpoints are defined in the configuration files by IP address. Each endpoint is therefore assumed to have a fixed (static) address. This is a reasonable assumption in the case of a server or firewall; however, for single client workstations (especially those using dial-up connections), this may not be feasible.

  2. There is no provision for automating the exchange of encryption keys in advance. Since each endpoint must agree on an encryption key and algorithm before a tunnel can be established, the VPN administrator will need to arrange some means of exchanging this information manually.

  3. For security reasons, these encryption keys have limited lifespans (typically just a few hours). There is no built-in mechanism for renewing them once they expire.

The Internet Key Exchange (IKE) protocol has now been developed in order to address these issues. However, an IKE implementation is not included in the firewall.

Without an IKE implementation, the only real way around these limitations is to use dynamic tunnels.


[Back] [Next]