About the IKE (Phase II) Page
You are here: VPN > IPsec (Phase II).
Use this page to configure IPsec VPN IKE (phase II).
Tasks You Can Perform
You can perform the following tasks from this page:
Add a VPN. See Add a VPN.
Add an IPsec policy. See Add an IPsec Policy.
Add a proposal. See Add a Proposal.
Edit an IKE (Phase I) configuration. See Edit an IKE (Phase II) Configuration.
Delete an IKE (Phase I) configuration. See Delete IKE (Phase II) Configuration.
Launch VPN wizard. To do this, click Launch Wizard available on the upper right corner of the IKE (Phase I) table. Follow the guided steps to configure the VPN wizard.
Table 1 describes the fields on the IKE (Phase II) Configuration page.
Table 1: Fields on the IKE (Phase II) Configuration Page
Enter the name of the VPN to be searched.
Displays the search specific to a VPN.
Displays the name of the VPN.
Displays the name of the gateway.
Displays the policy associated with this IPsec tunnel.
Displays the tunnel interface to which the route-based VPN is bound.
Displays the IPsec proxy identity.
Displays the name of the VPN monitoring option selected.
Displays the name of the IPsec policy.
Displays the description of the policy.
Perfect Forward Secrecy
Displays the method the device uses to generate the encryption key. PFS generates each new encryption key independent of the previous key.
Displays the name of the proposal to be used by the IPsec policy in Phase II.
Displays the name of the Phase II proposal.
Displays the hash algorithm that authenticates packet data.
Displays the type of security protocol.
Displays the IKE encryption algorithm type.