A SERVICE OF

logo

phase 2, the IKE peers use the ISAKMP SA established in Phase 1 to negotiate the parameters for
security protocols in IPsec and create IPsec SA to secure the transmission data.
3.5.1.1 IKE Policy
On this page you can configure the related parameters for IKE negotiation.
Choose the menu VPNIKEIKE Policy to load the following page.
Figure 3-58 IKE Policy
The following items are displayed on this screen:
IKE Policy
Policy Name:
Specify a unique name to the IKE policy for identification and
management purposes. The IKE policy can be applied to IPsec policy.
-80-