Step 1 - Host A sends interesting traffic to Host B.
Step 2 - R1 and R2 negotiate an
IKE Phase 1 session.
Step 3 - R1 and R2 negotiate an
IKE Phase 2 session.
Step 4 - Information is exchanged
via IPsec tunnel.
Step 5 - The IPsec tunnel is
terminated.