There is some traffic caught by a policy rule which needs to become encrypted or authenticated, but the policy doesn't have any SAs. There are two possible situations when it is activated:
Most of the time IKE daemon is doing nothing. Together they provide means for authentication of hosts and automatic management of security associations (SA). There are other key exchange schemes that work with ISAKMP, but IKE is the most widely used one. The Internet Key Exchange (IKE) is a protocol that provides authenticated keying material for Internet Security Association and Key Management Protocol (ISAKMP) framework.
#Shrew soft vpn ikev2 android#