HP ProCurve Threat Management Solution Implementation Guide 2009-05

C-63
Configure VPNs Using the HP ProCurve Threat Management Services zl Module
Configure a Client-to-Site IPsec VPN for Macintosh IPSecuritas Clients
Figure C-76. VPN > IPsec > IPsec Proposals Window
3. Click Add IPsec Proposal. The Add IPsec Proposal window is displayed.
Figure C-77. Add IPsec Proposal Window
4. For Proposal Name, type a unique, descriptive string of 1 to 10 alphanumeric characters.
The string must be unique to this proposal. For this example, type ESP3desMD5.
5. For Encapsulation Mode, select Tunnel Mode.
6. For Security Protocol, select AH or ESP. For this example, select ESP.
7. If you selected ESP in the previous step, select one of the following for Encryption Algorithm:
•DES
•3DES
AES-128 (16)
AES-192 (24)
AES-256 (32)
For this example, leave the default 3DES.
8. For Authentication Algorithm, select one of the following:
•MD5
SHA-1
For this example, leave the default MD5.
9. Click OK.
The IPsec proposal is displayed in the VPN > IPsec > IPsec Proposals window.