Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

About the IKE (Phase II) Page

You are here: Configure > Security Services > IPSec VPN > IKE (Phase II).

Use this page to configure IPSec VPN IKE (phase II).

Tasks You Can Perform

You can perform the following tasks from this page:

Field Descriptions

Table 264 describes the fields on the IKE (Phase II) Configuration page.

Table 264: Fields on the IKE (Phase II) Configuration Page

Field

Description

VPN

VPN Name

Enter the name of the VPN to be searched.

Search

Displays the search specific to a VPN.

Name

Displays the name of the VPN.

Gateway

Displays the name of the gateway.

IPSec Policy

Displays the policy associated with this IPsec tunnel.

Bind Interface

Displays the tunnel interface to which the route-based VPN is bound.

Proxy Identity

Displays the IPsec proxy identity.

VPN Monitoring

Displays the name of the VPN monitoring option selected.

IPSec Policy

Name

Displays the name of the IPsec policy.

Description

Displays the description of the policy.

Perfect Forward Secrecy

Displays the method the device uses to generate the encryption key. PFS generates each new encryption key independent of the previous key.

Proposal

Displays the name of the proposal to be used by the IPsec policy in Phase II.

Proposal

Name

Displays the name of the Phase II proposal.

Authentication Algorithm

Displays the hash algorithm that authenticates packet data.

Protocol

Displays the type of security protocol.

Encryption Algorithm

Displays the IKE encryption algorithm type.

Related Documentation

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit