HP ProCurve Threat Management Solution Implementation Guide 2009-05
C-35
Configure VPNs Using the HP ProCurve Threat Management Services zl Module
Configure a Client-to-Site L2TP over IPsec VPN for Windows XP Clients
Table C-5. IPsec Security Settings Proposed by Windows XP Clients
Figure C-39. Add IPsec Proposal Window
7. Click OK.
The IPsec proposal is displayed in the VPN > IPsec > IPsec Proposals window.
Figure C-40. VPN > IPsec > IPsec Proposals Window (Proposal Added)
8. Click Save.
Create an IPsec Policy for an L2TP over IPsec VPN
This section explains how to configure an IPsec policy for an L2TP over IPsec client-to-site
VPN. The IPsec policy selects L2TP traffic between the TMS zl Module and remote Windows
clients. It also includes security settings for the IPsec tunnel.
Follow these steps to create the IPsec policy:
1. In the left navigation bar of the Web browser interface, select VPN > IPsec.
2. Click the IPsec Policies tab.
Proposal Security Protocol Encryption Algorithm Authentication Algorithm
1 ESP 3DES SHA-1
2 ESP 3DES MD5
3 ESP DES SHA-1
4ESP DES MD5