After setting up the SSL/TLS session, the app authenticates with the gateway and requests the
gateway configuration (Get-Config-Request). To request the
configuration, the app proposes the encryption and authentication
algorithms and other settings such as preferred IP address for the
tunnel interface. The gateway responds to the request and selects
the encryption and authentication algorithm to use based on the
configuration of the GlobalProtect IPSec Crypto Profile
(Get-Config-Response) for an IPSec protocol and IKE Crypto Profile
for an IKEv2 protocol. |