First configure the pre-shared key on each device and then configure the IKE parameters on each device.
Why are all providers of Internet connectivity urged to implement the filtering described in RFC 2827?
How are denial of service attacks mitigated in the SAFE SMR midsize network design corporate Internet module?