In Phase 1 proposal configuration, you must set the authentiation method and authentication and encryption algorithms that will be used to open a secure channel between participants.
|
Before You Begin |
|---|
|
For background information, read |
When configuring Phase 1 of an IPsec tunnel using IKE, you first configure proposals, then policies, and finally you configure the gateway.
To configure Phase 1 proposals, use the J-Web or CLI configuration editor.
This topic covers: