In Phase 2 IPsec policy configuration, you must create a policy and reference a Phase 2 proposal.
|
Before You Begin |
|---|
|
For background information, read Configuring an IPsec Phase 2 Proposal. |
When configuring Phase 2 of an IPsec tunnel, you first configure proposals, then policies, and finally you configure IPsec AutoKey (IKE).
To configure Phase policies, use either the J-Web or the CLI configuration editor.
This topic covers: