HP ProCurve Threat Management Solution Implementation Guide 2009-05
C-62
Configure VPNs Using the HP ProCurve Threat Management Services zl Module
Configure a Client-to-Site IPsec VPN for Macintosh IPSecuritas Clients
c. For Authentication Algorithm, select one of these protocols, listed from least secure (and
least processor-intensive) to most:
– MD5
– SHA-1
For this example, leave the default MD5.
d. For SA Lifetime in Seconds, type the number of seconds that the IKE SA is kept open.
Valid values are between 300 seconds and 86400 seconds (1 day).
For this example, leave the default 28800.
12. Click Next.
13. This configuration example does not use XAUTH. Under XAUTH Configuration (Optional),
click Disable XAUTH.
Figure C-75. Add IKE Policy Window—Step 3 of 3
14. Click Finish. The IKE policy is displayed in the VPN > IPsec > IKEv1 Policies window.
Create an IPsec Proposal for Connecting to IPSecuritas Clients
Follow these steps to configure an IPsec proposal for a client-to-site IPsec VPN:
1. In the left navigation bar of the Web browser interface, click VPN > IPsec.
2. Click the IPsec Proposals tab.