About the IKE (Phase II) Page
You are here: VPN > IPsec (Phase II).
Use this page to configure IPsec VPN IKE (phase II).
Tasks You Can Perform
You can perform the following tasks from this page:
Add a VPN. See Add a VPN.
Add an IPsec policy. See Add an IPsec Policy.
Add a proposal. See Add a Proposal.
Edit an IKE (Phase I) configuration. See Edit an IKE (Phase II) Configuration.
Delete an IKE (Phase I) configuration. See Delete IKE (Phase II) Configuration.
Launch VPN wizard. To do this, click Launch Wizard available on the upper right corner of the IKE (Phase I) table. Follow the guided steps to configure the VPN wizard.
Field Descriptions
Table 1 describes the fields on the IKE (Phase II) Configuration page.
Table 1: Fields on the IKE (Phase II) Configuration Page
Field | Description |
---|---|
VPN | |
VPN Name | Enter the name of the VPN to be searched. |
Search | Displays the search specific to a VPN. |
Name | Displays the name of the VPN. |
Gateway | Displays the name of the gateway. |
IPsec Policy | Displays the policy associated with this IPsec tunnel. |
Bind Interface | Displays the tunnel interface to which the route-based VPN is bound. |
Proxy Identity | Displays the IPsec proxy identity. |
VPN Monitoring | Displays the name of the VPN monitoring option selected. |
IPSec Policy | |
Name | Displays the name of the IPsec policy. |
Description | Displays the description of the policy. |
Perfect Forward Secrecy | Displays the method the device uses to generate the encryption key. PFS generates each new encryption key independent of the previous key. |
Proposal | Displays the name of the proposal to be used by the IPsec policy in Phase II. |
Proposal | |
Name | Displays the name of the Phase II proposal. |
Authentication Algorithm | Displays the hash algorithm that authenticates packet data. |
Protocol | Displays the type of security protocol. |
Encryption Algorithm | Displays the IKE encryption algorithm type. |