B Configuring IKEv2 Interfaces
After configuring global IKE parameters, use the procedures described in this chapter to configure and monitor IKEv2 interfaces.
IKEv2 interface configuration consists of the following steps.
- Configure IKE interface attributes
- Configure Security Associations
- Configure Security Policies
- Configure the Dead Peer Detection Protocol (optional)
- Configure the Online Certificate Status Protocol or Certificate Revocation List Support (optional)
- Configure Threshold Crossing Alerts (optional)
- Configure access control whit/black lists (optional)