Tunnels and key management
Use a tunnel to negotiate and manage the security associations that are required to set up secure communication between two hosts.
The following types of tunnels are supported, each using a different key management technique:
- IKE tunnels (dynamically changing keys, IETF standard)
- Manual tunnels (static, persistent keys, IETF standard)