Configuring IPsec

ACL-based IPsec uses ACLs to identify the data flows to be protected. To implement ACL-based IPsec, configure IPsec policies, reference ACLs in the policies, and apply the policies to physical interfaces (see “Implementing ACL-based IPsec“). By using ACLs, you can customize IPsec policies as needed, implementing IPsec flexibly.