ON THIS PAGE
About the IPsec Profiles Page
To access this page, select Secure Edge > Service Management > IPsec Profiles.
IPsec profiles define the parameters with which an IPsec tunnel is established when the Customer Premises Equipment (CPE) devices start communicating with your Secure Edge solution in cloud.
Use this page to view, create, edit and delete IPsec profiles.
Tasks You Can Perform
You can perform the following tasks from this page:
- Create an IPsec profile—See Create an IPsec Profile.
- Edit or delete an IPsec profile—See Edit or Delete an IPsec Profile.
- View the details of an IPsec profile—Select an IPsec profile and click More > Detail, or mouse over the IPsec profile, and click the Detailed View icon. The Site Details tab appears on the right side of the IPsec profiles page.
Field Descriptions
Table 1 describes the fields on the IPsec Profiles page.
Field | Description |
---|---|
Profile Name | The name of the IPsec profile. |
Description | The description of the IPsec profile. |
IKE Auth Method |
The selected authentication method for an Internet Key Exchange (IKE) proposal. |
IKE Encryption Algorithm |
The selected encryption algorithm for an Internet Key Exchange (IKE) proposal. |
IPsec Encryption Algorithm | The selected IPsec encryption algorithm to allow data communication securely. |