HP TMS zl Module Security Administrator's Guide
4-211
Configuring a VPN on the HP TMS zl Module
Configuring an IPsec Site-to-Site VPN with IKE
The IKE policy is displayed in the TMS-VPN > IPsec > IKEv1 Policies window.
Move to the next task.
Create an IPsec Proposal for an IPsec Site-to-Site VPN
Each IPsec proposal specifies the following:
■ IPsec mode (tunnel or transport)
■ IPsec security protocol:
• AH and a single authentication algorithm
• ESP, a single authentication algorithm, and a single encryption algo-
rithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal:
1. Verify that you are at the correct level in the navigation tree:
• To configure a single TMS zl Module, the device’s name within the
TMS zl folder.
• To configure multiple modules, the TMS zl folder itself.
2. In the main configuration window, you should be at the TMS - VPN > IPsec
tab.
3. You can add the IPsec proposal in several ways:
• If you are configuring a single TMS zl Module, you can click the IPsec
Proposals tab. Right-click the TMS zl Module’s name and select Add.
Move to step 4 on page 4-86.