HP TMS zl Module Security Administrator's Guide
4-270
Configuring a VPN on the HP TMS zl Module
L2TP over IPsec VPNs
• ESP, a single authentication algorithm, and a single encryption algo-
rithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal:
1. Verify that you are at the correct level in the navigation tree:
• To configure a single TMS zl Module, the device’s name within the
TMS zl folder.
• To configure multiple modules, the Proactive TMS zl folder itself.
2. In the main configuration window, you should be at the TMS - VPN > IPsec
tab.
3. You can add the IPsec proposal in several ways:
• If you are configuring a single TMS zl Module, you can click the IPsec
Proposals tab. Right-click the TMS zl Module’s name and select Add.
Move to step 4 on page 4-279.
Figure 4-185. PCM+ > TMS-VPN > IPsec > IPsec Proposals Window
• Alternatively, open the Manage IPsec wizard either by right-clicking
the TMS zl Module’s name in the navigation tree and selecting the
wizard or by clicking the icon in the toolbar.