In Phase 1 gateway configuration, you must configure a gateway and reference the Phase 1 policy.
|
For background information, read Configuring an IKE Policy, Authentication, and Proposal. |
When configuring Phase 1 of an IPsec tunnel using IKE, you first configure proposals, then policies, and finally you configure the gateway.
To configure a gateway for an IKE tunnel, use either the J-Web or the CLI configuration editor.
This topic covers: