HP TMS zl Module Security Administrator's Guide

4-211
Configuring a VPN on the HP TMS zl Module
Configuring an IPsec Site-to-Site VPN with IKE
The IKE policy is displayed in the TMS-VPN > IPsec > IKEv1 Policies window.
Move to the next task.
Create an IPsec Proposal for an IPsec Site-to-Site VPN
Each IPsec proposal specifies the following:
IPsec mode (tunnel or transport)
IPsec security protocol:
AH and a single authentication algorithm
ESP, a single authentication algorithm, and a single encryption algo-
rithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal:
1. Verify that you are at the correct level in the navigation tree:
To configure a single TMS zl Module, the device’s name within the
TMS zl folder.
To configure multiple modules, the TMS zl folder itself.
2. In the main configuration window, you should be at the TMS - VPN > IPsec
tab.
3. You can add the IPsec proposal in several ways:
If you are configuring a single TMS zl Module, you can click the IPsec
Proposals tab. Right-click the TMS zl Module’s name and select Add.
Move to step 4 on page 4-86.