IKE Policy Window

IKE Policy Window
Step 9 Specify the encryption and authentication algorithms used by the IPSec
VPN tunnel, as shown in Figure 15-35.
492 Chapter 15: Adaptive Security Device Manager