TMS zl Management and Configuration Guide ST.1.0.090213
7-4
Virtual Private Networks
Overview
IPSecuritas for Macintosh IPsec with IKEv1 client-to-site VPN • See “Configure IPSecuritas for Macintosh VPN
Client” on page 7-153 for a list of steps.
• When configuring the IKE policy, IPsec policy,
and firewall access policies, follow the
instructions in the client-to-site sections.
ProCurve Secure Router
Series 7000dl
software version J.08.03
IPsec with IKEv1 site-to-site VPN • See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
• When configuring the IKE policy, follow the
instructions in the site-to-site sections.
• When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with IKE sections.
TMS zl Module IPsec with IKEv1 site-to-site VPN • See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
• When configuring the IKE policy, follow the
instructions in the site-to-site section.
• When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with IKE sections.
IPsec with manual keying site-to-site
VPN
• See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
• When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with manual keying sections.
GRE tunnel • See “Create a GRE Tunnel” on page 7-107 for
instructions.
• See also “Access Policies for a GRE Tunnel” on
page 7-126.
GRE over IPsec tunnel • See “Access Policies for a GRE Tunnel over
IPsec” on page 7-131.
• When configuring the IPsec policy, follow the
instructions in the site-to-site with manual
keying section. Use the settings indicated in
“Access Policies for a GRE Tunnel over IPsec”
on page 7-131.
Remote VPN Gateway or
Clients
VPN Type Configuration Guidelines