HP TMS zl Module Security Administrator's Guide

4-5
Configuring a VPN on the HP TMS zl Module
VPNs
VPNs
In addition to providing a firewall and an Intrusion Detection System/Intrusion
Prevention System (IDS/IPS), the HP Threat Management Services (TMS) zl
Module supports virtual private networks (VPNs). Using the TMS manage-
ment capabilities of HP Network Immunity Manager (NIM), you can configure
a VPN on one or more TMS zl Modules to connect two trusted endpoints over
an untrusted network. The two endpoints are connected through a tunnel,
which typically provides both data integrity and data privacy for the transmit-
ted traffic.
The TMS zl Module supports the following types of site-to-site VPNs and client-
to-site VPNs:
IP security (IPsec):
Client-to-site VPNs with Internet Key Exchange (IKE) version 1
Site-to-site VPNs:
–With IKE v1
With manual keying
L2TP and L2TP over IPsec—client-to-site VPNs
Generic Routing Encapsulation (GRE) tunnels and GRE over IPsec—site-
to-site VPNs
L2TP and GRE do not provide data integrity and data privacy on their own,
but they can be combined with IPsec, which secures the tunnel.
Each TMS zl Module supports:
4800 IPsec VPN connections
100 L2TP over IPsec connections
240 GRE connections
For client-to-site VPNs, the following VPN clients have been tested for use
with the TMS zl Module:
IPsec VPNs
Openswan for Linux
IPSecuritas for Macintosh OS X
Shrew Soft VPN Client
•HP VPN Client
L2TP over IPsec VPNs