Configure VPN security policies
After you determine how you will use your VPN you must define your VPN security policies.
Note:
After you configure your VPN security policies, you must then configure the secure connections.
Configure an Internet Key Exchange (IKE) policy
The IKE policy defines what level of authentication and encryption protection IKE uses during phase 1 negotiations.
Configure a data policy
A data policy defines what level of authentication or encryption protects data as it flows through the VPN.
Parent topic:
Configure VPN
Related tasks
Configure the VPN secure connection