Prerequisites for IKE configuration
Determine the following parameters prior to IKE configuration:
The algorithms to be used during IKE negotiation, including the identity authentication method, encryption algorithm, authentication algorithm, and DH group.
Different algorithms provide different levels of protection. A stronger algorithm provides more resistance to decryption but uses more resources.
A DH group that uses more bits provides higher security but needs more time for processing.
The pre-shared key or PKI domain for IKE negotiation. For more information about PKI, see "Configuring PKI."
The IKE-based IPsec policies for the communicating peers. If you do not specify an IKE profile in an IPsec policy, the device selects an IKE profile for the IPsec policy. If no IKE profile is configured, the globally configured IKE settings are used. For more information about IPsec, see "Configuring IPsec."