| Step 4 | Configure the IKEv2 properties. 
                    
                        
                            
                                Priority—The relative priority of the IKE
                                policy, from 1 to 65,535. The priority determines the order of the
                                IKE policy compared by the two negotiating peers when attempting to
                                find a common security association (SA). If the remote IPsec peer
                                does not support the parameters selected in your highest priority
                                policy, it tries to use the parameters defined in the next lowest
                                priority. The lower the number, the higher the priority.
                            
                                State—Whether the IKE policy is enabled or
                                disabled. Click the toggle to change the state. Only enabled
                                policies are used during IKE negotiations.
                            
                                Encryption—The encryption algorithm used to establish the Phase 1 security association (SA) for protecting Phase 2 negotiations. Select all algorithms that you want to allow, although you cannot include both mixed-mode (AES-GCM) and normal mode options in the same policy. (Normal mode requires that you select an integrity hash, whereas mixed-mode prohibits a separate integrity hash selection.) The system negotiates with the peer, starting from the strongest to the weakest algorithm until a match is agreed upon. For an explanation of the options, see Deciding Which Encryption Algorithm to Use.
                            
                                Diffie-Hellman Group—The Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires more processing time. The two peers must have a matching modulus group. Select all the algorithms that you want to allow. The system negotiates with the peer, starting from the strongest to the weakest group until a match is agreed upon. For an explanation of the options, see Deciding Which Diffie-Hellman Modulus Group to Use.
                            
                                Integrity Hash—The integrity portion of the hash algorithm for creating a message digest, which is used to ensure message integrity. Select all the algorithms that you want to allow. The system negotiates with the peer, starting from the strongest to the weakest algorithm until a match is agreed upon. The integrity hash is not used with the AES-GCM encryption options. For an explanation of the options, see Encryption and Hash Algorithms Used in VPN.
                            
                                Pseudo-Random Function (PRF) Hash—The pseudo-random function (PRF) portion of the hash algorithm, which is used as the algorithm to derive keying material and hashing operations required for the IKEv2 tunnel encryption. In IKEv1, the Integrity and PRF algorithms are not separated, but in IKEv2, you can specify different algorithms for these elements. Select all the algorithms that you want to allow. The system negotiates with the peer, starting from the strongest to the weakest algorithm until a match is agreed upon. For an explanation of the options, see Encryption and Hash Algorithms Used in VPN.
                            
                                Lifetime—The lifetime of the security
                                association (SA), in seconds, from 120 to 2147483647 or blank. When
                                the lifetime is exceeded, the SA expires and must be renegotiated
                                between the two peers. As a general rule, the shorter the lifetime
                                (up to a point), the more secure your IKE negotiations will be.
                                However, with longer lifetimes, future IPsec security associations
                                can be set up more quickly than with shorter lifetimes. The default
                                is 86400. To specify an unlimited lifetime, enter no value (leave
                                the field blank). |