You should determine IKE policy details for each peer before configuring IKE. The figure to the left shows a summary of IKE policy details that will be configured in examples and in labs for this chapter. The authentication method of pre-shared keys is covered in this chapter.