[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring an IPsec Policy

In Phase 2 IPsec policy configuration, you must create a policy and reference a Phase 2 proposal.

Before You Begin

For background information, read Configuring an IPsec Phase 2 Proposal.

When configuring Phase 2 of an IPsec tunnel, you first configure proposals, then policies, and finally you configure IPsec AutoKey (IKE).

To configure Phase policies, use either the J-Web or the CLI configuration editor.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]