HP TMS zl Module Security Administrator's Guide

4-86
Configuring a VPN on the HP TMS zl Module
Configure an IPsec Client-to-Site VPN
Figure 4-53. Manage IPsec Wizard > Add IPsec Proposal Window
4. For Proposal Name, type a descriptive string of 1 to 32 alphanumeric
characters. The string must be unique to this proposal.
Often, it is a good idea to indicate the algorithms that you will select in
the name—for example, ESP3desMD5.
5. For Encapsulation Mode, typically select Tunnel Mode.
Tunnel mode allows remote endpoints to reach services behind the TMS
zl Module. In transport mode, the VPN only supports traffic originated by
the remote endpoint or by the TMS zl Module itself. Therefore, transport
mode is typically used when you are creating a proposal for GRE over
IPsec site-to-site VPNs or L2TP over IPsec client-to-site VPNs.
6. For Security Protocol, select AH or ESP.
7. If you selected ESP in the previous step, select one of the following for
Encryption Algorithm:
NULL
If you select this option, VPN traffic will not be encrypted.
•DES
•3DES