[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring an IKE Gateway and Peer Authentication

In Phase 1 gateway configuration, you must configure a gateway and reference the Phase 1 policy.

For background information, read Configuring an IKE Policy, Authentication, and Proposal.

When configuring Phase 1 of an IPsec tunnel using IKE, you first configure proposals, then policies, and finally you configure the gateway.

To configure a gateway for an IKE tunnel, use either the J-Web or the CLI configuration editor.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]