[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring an IPsec Phase 2 Proposal

In Phase 2 proposal configuration, you must create a proposal, specify a security protocol, and select althentication and encryption algorithms for the traffic that will flow through the tunnel.

Before You Begin

For background information, read

When configuring Phase 2 of an IPsec tunnel, you first configure proposals, then policies, and finally you configure IPsec AutoKey (IKE).

To configure Phase 2 proposals, use either the J-Web or the CLI configuration editor.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]