In an IPSec VPN Tunnel, two peers use a negotiation process called IKE (Internet Key Exchange) to define the security mechanisms they will use to protect their communications. IKE has two phases. In the first negotiation phase, the peers define the security parameters they will use to communicate in the second phase. In order to identify each other and authenticate, the peers exchange VPN credentials. The VPN credentials can either be a pre-shared key or XAUTH; however, both peers must use the same VPN credential method and key for successful authentication.
In the Admin Portal, you can configure VPN credentials by either adding each credential individually or adding multiple credentials with a CSV file.
Configuring a VPN credential is one of the tasks you must complete when configuring an IPSec VPN tunnel. To learn more, see Configuring an IPSec VPN Tunnel.