Background:This document explains how the encryption algorithm and encryption key are used to build an IPsec tunnel. Configuration Options:Following options are available for Phase 1 and Phase 2 configuration:Phase 1:Authentication <pre-share, rsa-e...