Print Download Complete help as Archive Send Feedback

Previous

Next

Encrypt

What can I do here?

Use this window to configure the encryption schemes and methods of integrity used by this rule during the second phase of IKE.

Getting Here

Getting Here - Security Policies > Access Control > Policy (Traditional mode) > Action column > More > Encrypt > Edit

Encrypt - Transform Options

Specify the methods negotiated in IKE phase 2 and used in IPSEC connections. For example, if AES-128 and SHA1 are agreed upon in phase 2, all IPSEC connections matching the Encrypt security rule are built using these methods.