[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring an IKE Policy, Authentication, and Proposal

In Phase 1 IKE policy configuration, you must set the mode in which the Phase 1 channel will be negotiated, specify the type of key exchange to be used, and reference the Phase 1 proposal.

Before You Begin

For background information, read

When configuring Phase 1 of an IPsec tunnel using IKE, you first configure proposals, then policies, and finally you configure the gateway.

To configure IKE policies, use the J-Web or CLI configuration editor.

This topic covers:


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]