phase 2, the IKE peers use the ISAKMP SA established in Phase 1 to negotiate the parameters for
security protocols in IPsec and create IPsec SA to secure the transmission data.
3.5.1.1
IKE Policy
On this page you can configure the related parameters for IKE negotiation.
Choose the menu VPN→IKE→IKE Policy to load the following page.
The following items are displayed on this screen:
IKE Policy
Policy Name:
Figure 3-58 IKE Policy
Specify a unique name to the IKE policy for identification and
management purposes. The IKE policy can be applied to IPsec policy.
-80-