Virtual private network dead peer detection

ABSTRACT

Methods and systems are provided for detecting dead tunnels associated with a VPN. An indicator of a tunnel capability, for example, a DPD vendor ID, is received from a peer through a VPN connection. The tunnel capability is associated with one or more phase II tunnels associated with the VPN. Traffic generated by the peer is detected, and if traffic is detected at a tunnel, the tunnel is presumed to be alive. When no traffic is detected in a tunnel, a DPD packet exchange with the tunnel is initiated. A determination is made, based on the packet exchange, whether the tunnel is alive.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the priority benefit of U.S. patentapplication Ser. No. 14/150,537 filed Jan. 8, 2014, now U.S. Pat. No.9,294,461 issued on Mar. 22, 2016, the disclosure of which isincorporated herein by reference.

BACKGROUND OF THE INVENTION

A virtual private network (“VPN”) is a private network that uses apublic wide area network (“WAN”), such as the Internet, to securelyconnect remote sites or users together. Internet Protocol Security(“IPsec”) protocols may be used to establish mutual authenticationbetween participants in a VPN connection, for example, between asecurity gateway and a peer. Participants may use the IPsec protocolsuite and a two-phase Internet Key Exchange (“IKE”) protocol toestablish a security association (“SA”) and associated tunnels forexchanging secure communications.

Current techniques for detecting a dead peer in a VPN are onlyapplicable to phase I of the IKE protocol. Because more than one phaseII tunnel may be associated with an IKE SA established in phase I, thereis a need in the art for improved methods of detecting dead peers in VPNconnections.

SUMMARY OF THE PRESENTLY CLAIMED INVENTION

Methods and systems are provided for detecting dead peers. In someembodiments, a method for detecting a dead peer includes receiving anindicator of a tunnel capability from a peer through a VPN connection.The tunnel capability is associated with one or more tunnels associatedwith the VPN. The method further includes detecting traffic generated bythe peer, and initiating a packet exchange with the one or more tunnelswhen no traffic is detected in the one or more tunnels. The methodfurther includes determining, based on the packet exchange, whether theone or more tunnels are alive.

In some embodiments, a system for detecting a dead peer includes aprocessor, a memory, and one or more modules stored in the memory andexecutable by the processor to receive an indicator of a tunnelcapability from a peer through a VPN connection. The tunnel capabilityis associated with one or more tunnels associated with the VPN. The oneor more modules are further executable by the processor to detecttraffic generated by the peer, initiate a packet exchange with the oneor more tunnels when no traffic is detected in the one or more tunnels,and determine, based on the packet exchange, whether the one or moretunnels are alive.

In some embodiments, a computer readable storage medium has embodiedthereon a program, and the program is executable by a processor toperform a method for detecting a dead peer. The method includesreceiving an indicator of a tunnel capability from a peer through a VPNconnection. The tunnel capability is associated with one or more tunnelsassociated with the VPN. The method further includes detecting trafficgenerated by the peer, and initiating a packet exchange with the one ormore tunnels when no traffic is detected in the one or more tunnels. Themethod further includes determining, based on the packet exchange,whether the one or more tunnels are alive.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram of an exemplary VPN system.

FIG. 2 is a block diagram of an exemplary VPN gateway server.

FIG. 3 is a flow diagram of illustrative steps for phase II detection ofa dead peer through a VPN connection.

FIG. 4 is a flow diagram of illustrative steps for sending a DPD packetto one or more tunnels associated with a VPN.

FIG. 5 is a flow diagram of illustrative steps for replying to areceived DPD packet at one or more tunnels associated with a VPN.

FIG. 6 is a flow diagram of illustrative steps for phase II detection ofa dead peer through a VPN connection.

FIG. 7 is a block diagram of an exemplary computing environment inaccordance with some implementations of the present disclosure.

DETAILED DESCRIPTION

Embodiments of the invention provide phase II dead peer detection (DPD)protocol for determining the aliveness of tunnels associated with a VPN.As described above, two phases of negotiation are necessary to establishIPsec tunnels. In phase I, a secure, authenticated communication channelis established using a key exchange algorithm, which results in abi-directional IKE SA between participants. Each IKE SA may beassociated with one or more IPSec tunnels, and in phase II, the peersuse the secure communication channel established in phase I to negotiateSAs for the associated IPsec tunnels. As used herein, “IPsec tunnel,”“phase II tunnel,” and “tunnel” are used interchangeably and all referto a tunnel associated with a VPN.

During VPN communications, a loss of connectivity may occur due to, forexample, network stability or unmatched lifetime of SAs. Loss of peerconnectivity may result in a “black hole” situation, wherecommunications do not reach their destination, but instead are tunneledinto an unknown void. Thus, it is necessary to quickly detect losses ofpeer connectivity and take appropriate corrective actions.

Current DPD protocols are able to detect the liveliness of a phase I IKESA but cannot detect the liveliness of the associated IPsec tunnels inphase II. An IKE SA may be associated with more than one IPsec tunnel,but the current DPD protocol only queries the aliveness of the IKE SA,so one or more dead IPsec tunnels may go undetected. For example, a VPNgateway may establish one IKE SA with a peer, and the IKE SA may beassociated with two IPsec tunnels. If one IPsec tunnel is dead and theother is alive, then the current DPD protocol could not detect thesituation as long as the IKE SA is still alive, by virtue of theremaining alive IPsec tunnel. When the lifetime of the SA expires, thedead IPsec tunnel would need to be rekeyed, causing a gap in VPNcommunications. The present disclosure provides methods and systems forphase II detection of dead tunnels so as to improve VPN connectivitythrough early detection of losses in connectivity at the tunnel level.

FIG. 1 is a block diagram of an exemplary VPN system 100. VPN system 100of FIG. 1 includes computing devices 120, 122, and 124, private network102, VPN gateway server 104, network 106, VPN gateway server 108,private network 112, and computing devices 114, 116 and 118. VPN gatewayserver 104, for example, may initiate a VPN request with VPN gatewayserver 108. It will be understood that VPN gateway server 108 may alsoinitiate a VPN request with VPN gateway server 104. The VPN request mayinclude user credentials and an equipment identifier. In the example,the user identifier may be stored on VPN gateway server 104 or receivedvia input. The equipment identifier is associated with a piece ofequipment or hardware within VPN gateway server 104. VPN gateway server108 may receive the request over network 106. An exemplary VPN gatewayserver, for example, VPN gateway server 108, is discussed in more detailbelow with respect to FIG. 2.

Network 106 may be a public network, private network, WAN, Local AreaNetwork (“LAN”), intranet, the Internet, a mobile voice network, amobile data network, any other suitable network, or any combination ofthese networks. Network 106 may send and facilitate communicationbetween VPN gateway server 104 and VPN gateway server 108.

VPN gateway server 108 may communicate with network 106 and privatenetwork 112. VPN gateway server 104 may communicate with network 106 andprivate network 102. VPN gateway servers 104 and 108 may be implementedas network servers and/or application servers that communicate with theInternet. VPN gateway servers 104 and 108 may process requests for asecure VPN request. For example, VPN gateway server 108 may receive andprocess VPN connection requests from VPN gateway server 104.

Private networks 102 and 112 may be intranet or other private networks,for example private networks maintained by businesses. Computing devices114, 116 and 118 may be accessible to computing devices 120, 122, and124 through a secure VPN connection established via VPN gateway server104 and VPN Gateway Server 108.

FIG. 2 is a block diagram 200 of an exemplary VPN gateway server, forexample VPN gateway server 108. VPN gateway server 108 includesidentification module 202, traffic detection module 204, timing module206, and packet exchange module 208. It will be understood that VPNgateway server 108 may include any suitable modules, processes, orsubsystems for implementing the features described in the presentdisclosure. VPN system 100, including VPN gateway server 108 and itsmodules, processes, or subsystems, and any other hardware or software,or both, for implementing the features described in the presentdisclosure may be collectively referred to, herein, as “the system.”

In some embodiments, identification module 202 may determine whether ornot a peer has tunnel capability based on whether the identificationmodule 202 has received a unique identifier from the peer indicatingtunnel capability. In some embodiments, the system only continues withthe phase II DPD protocol if a peer has sent an identifier indicative oftunnel capability. Traffic detection module 204 may detect networktraffic associated with one more tunnels associated with the VPN. Insome embodiments, the system may detect traffic from one or more tunnelsand presume these one or more tunnels are alive. Timing module 206maintains a timer for each IPsec tunnel such that the timers are startedwhen phase II negotiation is complete (i.e., IPsec SAs are establishedfor the tunnels). Timing module 206 may restart a timer for a particulartunnel when traffic is detected at the tunnel by traffic detectionmodule 204. In some embodiments, when the timer expires (i.e., exceeds athreshold) before traffic is detected at a tunnel, timing module 206notifies packet exchange module 208, which initiates a packet exchangewith the inactive tunnel. In some embodiments, packet exchange module208 sends/receives a DPD packet, which includes pre-definedidentification fields for an IPsec tunnel participating in the phase IIDPD packet exchange. VPN gateway server 108 may detect dead peers (i.e.,dead IPsec tunnels) based on the DPD packet exchange. It will beunderstood that FIG. 2 is described above in the context of VPN gatewayserver 108 of FIG. 1 for purposes of clarity and brevity and not by wayof limitation. The exemplary VPN gateway server of FIG. 2 may alsocorrespond to VPN gateway server 104 of FIG. 1.

As described above, encryption of FIGS. 3-6 provide illustrative stepsfor performing phase II DPD packet exchanges to determine whethertunnels associated with the VPN are alive.

FIG. 3 is a flow diagram 300 of illustrative steps for phase IIdetection of a dead peer through a VPN connection.

At step 302, the system receives an indicator of tunnel capability froma peer through a VPN connection. As described above, two phases ofnegotiation are necessary in order to establish an IPsec tunnel. Inphase I negotiation, a secure channel for communication betweenparticipants (i.e., IKE SA) is established using a key exchangealgorithm. In some embodiments, the system receives an indication oftunnel capability in the phase I negotiation. In other words, the systemmay use the phase I negotiation to determine whether the peer supportsphase II negotiation. In some embodiments, the indicator of tunnelcapability received by the system at step 302 is indicative of phase IIDPD capability. The indicator of tunnel capability may be a DPD vendoridentifier (ID). In some embodiments, step 302 is implemented byidentification module 202 of FIG. 2.

At step 304, the system detects traffic generated by the peer. Thesystem may detect traffic generated by the peer at phase II tunnelswithin the VPN connection. In some embodiments, step 302 is implementedby traffic detection module 204 of FIG. 2. At step 306, the systeminitiates a packet exchange with one or more tunnels associated with theVPN when no traffic is detected in step 304. In order for the packetexchange to be initiated with a peer, a peer must send an indication oftunnel capability (e.g., DPD vendor ID), as described above inconnection with step 302. In some embodiments, step 304 is implementedby packet exchange module 208 of FIG. 2. Some embodiments of step 304are further discussed in connection with FIGS. 4-5. FIGS. 4-5 showillustrative steps for conducting a packet exchange with one or moretunnels associated with a VPN.

FIG. 4 is a flow diagram 400 of illustrative steps for sending a DPDpacket to one or more tunnels associated with a VPN. In someembodiments, the steps of FIG. 4 may be implemented by packet exchangemodule 208 of FIG. 2. At step 402, the system determines if the IPsectunnels have been established for a peer (i.e., IPsec enabled). If theIPsec tunnels have not been established, the system sets a DPD requestcount to 0 at step 404. The system may maintain a running count of thenumber of DPD packets (i.e., DPD requests) sent to an IPsec tunnel. Ifthe IPsec tunnels have been established for the peer, the systemdetermines whether an IPsec tunnel was recently alive at step 406. Insome embodiments, the system determines whether or not a tunnel wasrecently alive based on a timer associated with the tunnel, for example,a timer discussed in connection with the timing module 206 of FIG. 2. Iftraffic is detected in the tunnel within a predetermined period of time(i.e., timer has not expired), the system will determine the tunnel isalive at step 408.

If traffic is not detected in the tunnel within the predetermined periodof time (i.e., the timer expires), then the system proceeds to step 410and determines whether the DPD request count exceeds a threshold value.In some embodiments, the threshold value is a maximum number of DPDrequests. For example, the threshold may be 3 DPD packet requests. Insome embodiments, the threshold value may be between 3 and 10 DPD packetrequests. At step 412, the system determines the tunnel is dead if theDPD request count exceeds the threshold. If the DPD request count doesnot exceed the threshold, the system will proceed to steps 414-420 tobuild and send a DPD request.

At step 414, the system builds a DPD packet. In some embodiments, theDPD packet may use an Internet Control Message Protocol (ICMP) echorequest/reply message and include predefined fields that identify thetunnel. For example, the DPD packet may include the tunnel's securityparameter index (SPI). In some embodiments, the system selects thesource/destination Internet Protocol (IP) address of the ICMP from thesource range/destination range of the tunnel. At step 416, the systemsends the DPD packet built in step 414. At step 420, the systemincrements the DPD request count by 1 to reflect the sent DPD packet instep 418. After a DPD packet is sent in step 418, it may be received asan encrypted packet at an IPsec tunnel associated with the VPN, asdescribed below in FIG. 5.

FIG. 5 is a flow diagram 500 of illustrative steps for replying to areceived DPD packet at one or more tunnels associated with a VPN. Insome embodiments, the steps of FIG. 5 may be implemented by packetexchange module 208 of FIG. 2. At step 502, an encrypted packet isreceived at an IPsec tunnel. In some embodiments, the packet may beencrypted using a security protocol, for example an encapsulatingsecurity payload (ESP) or an authentication header (AH) securityprotocol. At step 504, the system updates the tunnel alive status andconsequently the peer alive status. At step 506, the system updates thetimestamp and sets the DPD request count to 0. In some embodiments, thetimestamp may indicate the time at which the DPD packet was received. Atstep 508, the system sends a DPD reply packet, and the system determinesthe respective tunnel is alive after receipt of the DPD reply packet atstep 510.

Referring back to FIG. 3, at step 308, the system determines, based onthe packet exchange, whether the tunnels are alive. In some embodiments,the system determines a tunnel is dead after a predetermined number ofpacket exchanges fail. For example, the system may determine a tunnel isdead when the DPD request count is 3.

At step 310, the system determines whether it is okay to start a newnegotiation with a peer when it is determined that a tunnel is dead. Thesystem may make this determination based on whether or not the peer withwhich it wishes to negotiate grants permission. At step 312, the systemdeletes the dead tunnel when it is determined that it is not okay tonegotiate. At step 314, the system renegotiates an SA with the peer toreestablish a VPN connection with the dead tunnel.

FIG. 6 is a flow diagram 600 of illustrative steps for phase IIdetection of a dead peer through a VPN connection. In some embodiments,the steps of FIG. 6 may be implemented by timing module 206 of FIG. 2.At step 602, the system starts the timer when the phase II negotiationof IPsec tunnels is complete. At step 604, the system determines whetherthe tunnel is active. The system may determine a tunnel is active if VPNtraffic is detected and/or a peer query is received. If the tunnel isdetermined to be active, the system returns to step 602, the tunnel isdetermined to be active, the timer is restarted, and the preceding stepsof flow diagram 600 are repeated. If the tunnel does not exhibit anyaction before the timer passes a predetermined timer threshold at step606, the tunnel is determined to be inactive, and then the system willsend a DPD packet request at step 608. In some embodiments, the timerthreshold is a value between 120 and 600 seconds. For example, the timerthreshold may be 180 seconds.

In some embodiments, the timer may restart after it passes the thresholdin step 606. Thus, at step 610, the system again determines whether atunnel is active before the timer passes a threshold, shown as step 612.The threshold passed in step 612 may be the same as described above inconnection with step 606. At step 610, the system may determine thetunnel is active if VPN traffic is detected, a peer query is received,and/or a response to the DPD packet is received. If the peer isdetermined to be active, the system returns to step 602, the tunnel isdetermined to be active, the timer is restarted, and the preceding stepsof flow diagram 600 are repeated.

After the timer has expired in step 612, the system determines whetherthe DPD request count exceeds the maximum allowed number of DPDrequests. In other words, the system may determine whether the number offailed packet exchanges with a tunnel exceeds or is equal to apredetermined number. Step 612 may correspond to step 410 of FIG. 4. Ifit is determined that the system has exceeded the maximum number of DPDrequests, the system will determine the tunnel is dead at step 616, andthe method may proceed to step 310 of FIG. 3 (not illustrated in FIG.6), to determine whether the system should delete the dead tunnel, asdescribed in step 312, or renegotiate an SA with the peer to reestablisha VPN connection with the dead tunnel, as described in step 314.

FIG. 7 is a block diagram of an exemplary computing system 700 forimplementing the present technology. Computing system 700 of FIG. 7 maybe implemented, for example, in the contexts of computing devices 120,122, and 124, private network 102, VPN gateway server 104, network 106,VPN gateway server 108, private network 112, and computing devices 114,116, and 118. Computing system 700 includes one or more processors 702and memory 704. Main memory 704 stores, in part, instructions and datafor execution by processor 702. Main memory 704 may store executablecode when in operation. Computing system 700 of FIG. 7 further includesa mass storage device 706, portable storage medium drive(s) 708, outputdevices 710, user input devices 712, a graphics display 714, andperipheral devices 716.

For purposes of brevity and clarity, and not by way of limitation, thecomponents of computing system 700 are depicted in FIG. 7 as beingconnected via a single bus 718. It will be understood, however, that thecomponents may be connected through one or more data transport means.For example, processor unit 702 and main memory 704 may be connected viaa local microprocessor bus, and the mass storage device 706, peripheraldevice(s) 716, portable storage device 708, and display system 714 maybe connected via one or more input/output (I/O) buses.

Mass storage device 706, which may be implemented with a magnetic diskdrive or an optical disk drive, is a non-volatile storage device forstoring data and instructions for use by processor 702. Mass storagedevice 706 can store the system software for implementing embodiments ofthe present invention for purposes of loading that software into mainmemory 704.

Portable storage device 708 operates in conjunction with a portablenon-volatile storage medium, such as a floppy disk, compact disk orDigital video disc, to input and output data and code to and from thecomputer system 700 of FIG. 7. The software for implementing embodimentsof the present invention may be stored on such a portable medium andinput to the computer system 700 via the portable storage device 708.

Input devices 712 provide a portion of a user interface. Input devices712 may include an alphanumeric keypad, such as a keyboard, forinputting alphanumeric and other information, a pointing device, such asa mouse, a trackball, stylus, cursor direction keys, a touchscreen, atouchscreen including a virtual keyboard, or any other suitable inputdevices. Computing system 700 additionally includes output devices 710.Output devices 710 may include any suitable output devices, for example,speakers, printers, network interfaces, and monitors.

Display system 714 may include a liquid crystal display (LCD), lightemitting diode (LED) display, plasma display, or other suitable displaydevice. Display system 714 receives textual and graphical information,and processes the information for output to the display device.

Peripherals 716 may include any type of computer support device to addadditional functionality to the computer system. For example, peripheraldevice(s) 716 may include a modem or a router.

The components contained in computing system 700 of FIG. 7 are thosetypically found in computer systems that may be suitable for use withembodiments of the present invention and are intended to represent abroad category of such computer components that are well known in theart. Computing system 700 of FIG. 7 may be a personal computer, handheld computing device, telephone, mobile computing device, workstation,server, minicomputer, mainframe computer, or any other computing device.Computing system 700 may also include different bus configurations,networked platforms, multi-processor platforms, any other suitablecomponents, or any combination thereof. Computing system 700 may use anysuitable operating system, including, for example, Unix, Linux, Windows,Macintosh Operating System (OS), Palm OS, and other suitable operatingsystems.

The foregoing detailed description of the technology herein has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the technology to the precise formdisclosed. Many modifications and variations are possible in light ofthe above teachings. The described embodiments were chosen in order tobest explain the principles of the technology and its practicalapplication to thereby enable others skilled in the art to best utilizethe technology in various embodiments and with various modifications asare suited to the particular use contemplated. It is intended that thescope of the technology be defined by the claims appended hereto.

What is claimed is:
 1. A method for detecting a dead peer managinginternet protocol (IP) tunnels, the method comprising: sending a requestfrom a first server to establish a virtual private network (VPN)connection over a communication network to a second server; exchanginginformation between the first server and the second server according toan internet key exchange protocol; identifying that the second serversupports phase II tunnels within the VPN connection, wherein a firstphase II tunnel and a second phase II tunnel are initiated with thesecond server; exchanging one or more data packets between the firstserver and the second server over the first phase II tunnel and thesecond phase II tunnel; identifying that a packet of the one or morepackets has failed; and identifying that at least one of the first phaseII tunnel and the second phase II tunnel is dead based on identifyingthe failed packet.
 2. The method of claim 1, further comprisingre-establishing the identified dead phase II tunnel after identifyingthat at least one of the first phase II tunnel and the second phase IItunnel is dead.
 3. The method of claim 1, wherein the packet of the oneor more packets is one of a pre-determined number of failed packets. 4.The method of claim 1, further comprising identifying that at least oneof the first phase II tunnel and the second phase II tunnel has beeninactive for a first pre-determined period of time, wherein the failedpacket is a dead peer detection packet sent after the firstpre-determined period of time.
 5. The method of claim 4, furthercomprising identifying that one or more other dead peer detectionpackets have failed after a second pre-determined period of time,wherein at least one of the first phase II tunnel and the second phaseII tunnel is identified as being dead after the one or more other deadpeer detection packets have failed.
 6. The method of claim 1, whereinthe failed packet includes an identification field.
 7. The method ofclaim 6, wherein the identification field includes at least one of anidentifier of at least one of the first phase II tunnel and the secondphase II tunnel and a security parameter index.
 8. A non-transitorycomputer readable storage medium having embodied thereon a programexecutable by a processor for performing a method for managing internetprotocol (IP) tunnels, the method comprising: sending a request toestablish a virtual private network (VPN) connection; exchanginginformation with a server according to an internet key exchangeprotocol; identifying that the server supports phase II tunnels withinthe VPN connection, wherein a first phase II tunnel and a second phaseII tunnel are initiated with the server; exchanging one or more datapackets with the server over the first phase H tunnel and the secondphase II tunnel; identifying that a packet of the one or more packetshas failed; and identifying that at least one of the first phase IItunnel and the second phase II tunnel is dead based on identifying thefailed packet.
 9. The non-transitory computer readable storage medium ofclaim 8, the program further executable to re-establish the identifieddead phase II tunnel after identifying that at least one of the firstphase II tunnel and the second phase II tunnel is dead.
 10. Thenon-transitory computer readable storage medium of claim 8, wherein thefailed packet is one of a pre-determined number of failed packets. 11.The non-transitory computer readable storage medium of claim 8, theprogram further executable to identify that at least one of the firstphase II tunnel and the second phase II tunnel has been inactive for afirst pre-determined period of time, wherein the failed packet is a deadpeer detection packet sent after the first pre-determined period oftime.
 12. The non-transitory computer readable storage medium of claim11, the program further executable to identify that one or more otherdead peer detection packets have failed after a second pre-determinedperiod of time, wherein at least one of the first phase II tunnel andthe second phase II tunnel is identified as being dead after the one ormore other dead peer detection packets have failed.
 13. Thenon-transitory computer readable storage medium of claim 8, wherein thefailed packet includes an identification field.
 14. The non-transitorycomputer readable storage medium of claim 13, wherein the identificationfield includes at least one of an identifier of at least one of thefirst phase II tunnel and the second phase II tunnel and a securityparameter index.
 15. An apparatus for managing internet protocol (IP)tunnels, the apparatus comprising: a network communication interfacethat: sends a request to establish a virtual private network (VPN)connection with a server; exchanges information regarding the VPNconnection; a memory; and a processor, wherein the processor executinginstructions out of the memory: identifies the server supports phase IItunnels within the VPN connection, wherein a first phase II tunnel and asecond phase II tunnel are initiated with the second server, and one ormore data packets are exchanged with the server over the first phase IItunnel and the second phase II tunnel, identifies that a packet of theone or more packets has failed, and identifies that at least one of thefirst phase II tunnel and the second phase II tunnel is dead based onidentifying the failed packet.
 16. The apparatus of claim 15, furthercomprising re-establishing the identified dead phase II tunnel afteridentifying that at least one of the first phase II tunnel and thesecond phase II tunnel is dead.
 17. The apparatus of claim 15, whereinthe failed packet is one of a pre-determined number of failed packets.18. The apparatus of claim 15, further comprising identifying that atleast one of the first phase II tunnel and the second phase II tunnelhas been inactive for a first pre-determined period of time, wherein thepacket of the one or more packets is a dead peer detection packet sentafter the first predetermined period of time.
 19. The apparatus of claim18, further comprising identifying that one or more other dead peerdetection packets have failed after a second pre-determined period oftime, wherein at least one of the first phase II tunnel and the secondphase II tunnel is identified as being dead after the one or more otherdead peer detection packets have failed.
 20. The apparatus of claim 15,wherein the failed packet includes an identification field.