HP TMS zl Module Security Administrator's Guide
4-82
Configuring a VPN on the HP TMS zl Module
Configure an IPsec Client-to-Site VPN
Create an IPsec Proposal for a Client-to-Site VPN
Each IPsec proposal specifies the following:
■ IPsec mode (tunnel or transport)
■ IPsec security protocol:
• AH and a single authentication algorithm
• ESP, a single authentication algorithm, and a single encryption algo-
rithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure the IPsec proposal:
1. Verify that you are at the correct level in the navigation tree:
• To configure a single TMS zl Module, the device’s name within the
TMS zl folder.
• To configure multiple modules, the TMS zl folder itself.
2. In the main configuration window, you should be at the TMS - VPN > IPsec
tab.
3. You can add the IPsec proposal in several ways:
• If you are configuring a single TMS zl Module, you can click the IPsec
Proposals tab. Right-click the TMS zl Module’s name and select Add.
Move to step 4 on page 4-86.
Figure 4-49. PCM+ > TMS-VPN > IPsec > IPsec Proposals Window