Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

About the IKE (Phase II) Page

 

You are here: VPN > IPsec (Phase II).

Use this page to configure IPsec VPN IKE (phase II).

Tasks You Can Perform

You can perform the following tasks from this page:

Field Descriptions

Table 1 describes the fields on the IKE (Phase II) Configuration page.

Table 1: Fields on the IKE (Phase II) Configuration Page

Field

Description

VPN

VPN Name

Enter the name of the VPN to be searched.

Search

Displays the search specific to a VPN.

Name

Displays the name of the VPN.

Gateway

Displays the name of the gateway.

IPsec Policy

Displays the policy associated with this IPsec tunnel.

Bind Interface

Displays the tunnel interface to which the route-based VPN is bound.

Proxy Identity

Displays the IPsec proxy identity.

VPN Monitoring

Displays the name of the VPN monitoring option selected.

IPSec Policy

Name

Displays the name of the IPsec policy.

Description

Displays the description of the policy.

Perfect Forward Secrecy

Displays the method the device uses to generate the encryption key. PFS generates each new encryption key independent of the previous key.

Proposal

Displays the name of the proposal to be used by the IPsec policy in Phase II.

Proposal

Name

Displays the name of the Phase II proposal.

Authentication Algorithm

Displays the hash algorithm that authenticates packet data.

Protocol

Displays the type of security protocol.

Encryption Algorithm

Displays the IKE encryption algorithm type.