The IPsec (Phase 2) proposal occurs with both IKEv1 and IKEv2. In this phase, the two parties negotiate the type of security to use, which encryption methods to use for the traffic through the tunnel (if needed), and negotiate the lifetime of the tunnel before re-keying is needed.
The two types of security for individual packets are:
SonicOS/X supports the following Encryption methods for traffic through the VPN:
|
|
|
|
|
|
|
|
|
|
|
|
SonicOS/X supports the following Authentication methods:
|
|
|
|
|
|||
|
|||
|