HP ProCurve Threat Management Solution Implementation Guide 2009-05
vi
Configure a Client-to-Site IPsec VPN for HP ProCurve VPN Clients . . . . . . . . . . . . . . . . . . . . . C-79
Configure an Client-to-Site IPsec VPN on the TMS zl Module . . . . . . . . . . . . . . . . . . . . . . C-79
Create Named Objects for the IPsec Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . C-80
Create an IKE Policy for Connecting to HP ProCurve VPN Clients . . . . . . . . . . . . . . . C-81
Create an IPsec Proposal for Connecting to HP ProCurve VPN Clients . . . . . . . . . . . . C-85
Create an IPsec Policy for a Client-to-Site IPsec VPN with
HP ProCurve VPN Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-87
Configure Authentication for XAUTH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-91
Access Policies for an Client-to-Site IPsec VPN for HP ProCurve VPN Clients . . . . . C-93
Verify Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-96
Configure the HP ProCurve VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-96