Hi,
The algorithms defined in Phase 1 (isakmp policy) are used to establish an IKE SA (Security Association), through which 2 x IPSec SA (inbound/outbound) is negotiated using the Phase 2 algorithms defined in the IPSec Transform Set. All data transmitted through the VPN is over the IPSec SAs.
HTH