IKE Policy Window
Step 5 Configure the transform set to specify the encryption and
authentication algorithms used by IPSec, as shown in Figure 15-24.
IPSec provides secure communication over an insecure network, such as
the public Internet, by encrypting traffic between two IPSec peers, such
as your local Security Appliance and a remote Security Appliance or
VPN concentrator.