HP TMS zl Module Security Administrator's Guide
4-279
Configuring a VPN on the HP TMS zl Module
L2TP over IPsec VPNs
Figure 4-195. Manage IPsec Wizard > Add IPsec Policy (step 1) Window
4. For Policy Name, type an alphanumeric string between 1 and 32 characters.
The string must be unique to this policy.
5. By default, the Enable this policy check box is selected, which means that
the policy will begin taking effect as soon as you finish it. Clear the check
box if you want to enable the policy later.
6. For Action, select how the TMS zl Module treats traffic that is selected for
this policy (which you will configure in step 3):
• Apply—Traffic is forwarded to its destination and is secured by the
IPsec SA. This is the typical selection.
• Bypass—Traffic is forwarded to its destination but is not secured by
the IPsec SA.
• Deny—Traffic is discarded.
7. For Position, type a number.
The position determines the order in which the TMS zl Module processes
IPsec policies. The module processes the policy with the lowest value first
(for example, position 1 before position 2). The position matters most
when policies have overlapping traffic selectors. In this case, assign the
highest position (lowest value) to the IPsec policy with the most specific
traffic selector.