In Phase 2 proposal configuration, you must create a proposal, specify a security protocol, and select althentication and encryption algorithms for the traffic that will flow through the tunnel.
|
Before You Begin |
|---|
|
For background information, read |
When configuring Phase 2 of an IPsec tunnel, you first configure proposals, then policies, and finally you configure IPsec AutoKey (IKE).
To configure Phase 2 proposals, use either the J-Web or the CLI configuration editor.
This topic covers: