What are the parameters in Phase 1 in VPN

-An authentication method to ensure the identity of the peers.

-An encryption method to protect the data and ensure privacy.

-A Hashed Message Authentication Codes (HMAC) method to ensure the identity of the sender and to ensure that the message has not been modified in transit.

-A Diffie-Hellman group to determine the strength of the encryption-key-determination algorithm. The security appliance uses this algorithm to derive the encryption and hash keys.

-A limit for how long the security appliance uses an encryption key before replacing it.