B Configuring IKEv2 Interfaces

After configuring global IKE parameters, use the procedures described in this chapter to configure and monitor IKEv2 interfaces.

IKEv2 interface configuration consists of the following steps.

  1. Configure IKE interface attributes
  2. Configure Security Associations
  3. Configure Security Policies
  4. Configure the Dead Peer Detection Protocol (optional)
  5. Configure the Online Certificate Status Protocol or Certificate Revocation List Support (optional)
  6. Configure Threshold Crossing Alerts (optional)
  7. Configure access control whit/black lists (optional)