Configuring IKE (Task Map)
You can use preshared keys, self-signed certificates, and certificates from a Certificate Authority
(CA) to authenticate IKE. A rule links the particular IKE authentication method with
the end points that are being protected. Therefore, you can use one or
all IKE authentication methods on a system. A pointer to a PKCS #11 library
enables certificates to use an attached hardware accelerator.
After configuring IKE, complete the IPsec task that uses the IKE configuration. The
following table refers you to task maps that focus on a specific IKE
configuration.