HP TMS zl Module Security Administrator's Guide

4-64
Configuring a VPN on the HP TMS zl Module
Configure an IPsec Client-to-Site VPN
–3DES
AES-192 (24)
AES-256 (32)
The number in parentheses after AES options indicates the key length
for the algorithm in bytes.
c. For Authentication Algorithm, select one of these protocols, listed from
least secure (and least processor-intensive) to most:
–MD5
–SHA-1
d. For SA Lifetime in Seconds, type the number of seconds that the IKE
SA is kept open.
Valid values are between 300 seconds and 86400 seconds (1 day).
Remember that this setting applies to IKE SA, which is a temporary
tunnel used only to establish the IPsec SA.
26. Click Next.
Figure 4-35. Deploy IPsec Remote-Access VPN Wizard > Configure Advanced
IPsec Settings
27. For Encapsulation Mode, typically select Tunnel Mode.