HP TMS zl Module Security Administrator's Guide

4-233
Configuring a VPN on the HP TMS zl Module
Configuring an IPsec Site-to-Site VPN with Manual Keying
Table 4-26. Possible Named Objects for an IPsec Site-to-Site VPN with Manual
Keying
Figure 4-155. Example IPsec Site-to-Site VPN
Create an IPsec Proposal
Each IPsec proposal specifies the following:
IPsec mode (tunnel or transport)
IPsec security protocol:
AH and a single authentication algorithm
ESP, a single authentication algorithm, and a single encryption algo-
rithm
Figure
Reference
Named Object Type Named Object Description Location Where the Named
Object is Specified
2 Single-entry IP, range, or network
address objects
The IP addresses of local
endpoints that are allowed to send
traffic over the VPN
Local Address in the IPsec
policy traffic selector
Source or Destination for
firewall access policies that
permit traffic sent across the
VPN
4 Single-entry or multiple-entry IP,
range, or network address objects
The IP addresses of endpoints
behind the remote VPN gateway
Remote Address in the IPsec
policy traffic selector
Source or Destination for
firewall access policies that
permit traffic sent across the
VPN