HP ProCurve Threat Management Solution Implementation Guide 2009-05
C-64
Configure VPNs Using the HP ProCurve Threat Management Services zl Module
Configure a Client-to-Site IPsec VPN for Macintosh IPSecuritas Clients
Figure C-78. VPN > IPsec > IPsec Proposals Window (Proposal Added)
10. Click Save.
Create an IPsec Policy for a Client-to-Site IPsec VPN with Macintosh
IPSecuritas Clients
This section explains how to configure an IPsec policy for a client-to-site VPN that is intended
for Macintosh IPSecuritas clients. The IPsec policy selects traffic between local IP addresses
that are accessible to the remote clients and the remote clients. It includes security settings
for the IPsec connection.
Follow these steps to create the IPsec policy:
1. In the left navigation bar of the Web browser interface, select VPN > IPsec.
2. Click the IPsec Policies tab.
Figure C-79. VPN > IPsec > IPsec Policies Window
3. Click Add IPsec Policy.