[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring an IKE Phase 1 Proposal

In Phase 1 proposal configuration, you must set the authentiation method and authentication and encryption algorithms that will be used to open a secure channel between participants.

Before You Begin

For background information, read

When configuring Phase 1 of an IPsec tunnel using IKE, you first configure proposals, then policies, and finally you configure the gateway.

To configure Phase 1 proposals, use the J-Web or CLI configuration editor.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]