HP TMS zl Module Security Administrator's Guide

4-109
Configuring a VPN on the HP TMS zl Module
Configuring an IPsec Site-to-Site VPN with IKE
Figure 4-65. Example IPsec Site-to-Site VPN
Table 4-14. Possible Named Objects for an IPsec Hub and Spokes VPN (Three
Modules)
Example
Figure
Reference
Named Object Type Named Object Description Location Where the Named
Object is Specified
1 Single-entry IP address object The IP address for the VPN
gateway on the Hub module
Firewall access policies on all
modules—Source or
Destination for policies that
permit IKE traffic
2 Single-entry IP, range, or
network address objects
The IP addresses of Hub
endpoints that are allowed to
send traffic over the VPN
Local Network Address on
Hub in the Deploy IPsec
Site-to-Site VPN wizard
Firewall access policies on
all modules—Source or
Destination for policies that
permit traffic sent across
the VPN
3 Single-entry IP address object The IP address for the VPN
gateway on the Spoke 1
module
Firewall access policies on the
Hub and Spoke 1 modules—
Source or Destination for
policies that permit IKE traffic
4 Single-entry IP, range, or
network address objects
The IP addresses of Spoke 1
endpoints that are allowed to
send traffic over the VPN
Local Network Address on
Spoke 1 in the Deploy IPsec
Site-to-Site VPN wizard
Firewall access policies on
Hub and Spoke 1
modules—Source or
Destination for policies that
permit traffic sent across
the VPN