To establish an IKE IPSec tunnel, two phases of negotiation
are required. This table specifies the configuration attributes
for Phase Two negotiation. In Phase 2, the participants
negotiate the IPSec SAs for encrypting and authenticating the
ensuing exchanges of user data.