The remote host seems to be enabled to do Internet Key Exchange (IKE).
The remote host seems to be enabled to do Internet Key Exchange (IKE). This is typically indicative of a VPN server. VPN servers are used to connect remote hosts into internal resources. You should ensure that: the VPN is authorized for your company's computing environment, the VPN utilizes strong encryption and that the VPN utilizes strong authentication.
Contact your VPN vendor to ensure that you are operating at a security level commensurate with the assets being protected.