TMS zl Management and Configuration Guide ST.1.0.090213

7-4
Virtual Private Networks
Overview
IPSecuritas for Macintosh IPsec with IKEv1 client-to-site VPN See “Configure IPSecuritas for Macintosh VPN
Client” on page 7-153 for a list of steps.
When configuring the IKE policy, IPsec policy,
and firewall access policies, follow the
instructions in the client-to-site sections.
ProCurve Secure Router
Series 7000dl
software version J.08.03
IPsec with IKEv1 site-to-site VPN See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
When configuring the IKE policy, follow the
instructions in the site-to-site sections.
When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with IKE sections.
TMS zl Module IPsec with IKEv1 site-to-site VPN See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
When configuring the IKE policy, follow the
instructions in the site-to-site section.
When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with IKE sections.
IPsec with manual keying site-to-site
VPN
See “Configure an IPsec VPN Connection” on
page 7-21 for a list of steps.
When configuring the IPsec policy and firewall
access policies, follow the instructions in the
site-to-site with manual keying sections.
GRE tunnel See “Create a GRE Tunnel” on page 7-107 for
instructions.
See also “Access Policies for a GRE Tunnel” on
page 7-126.
GRE over IPsec tunnel See “Access Policies for a GRE Tunnel over
IPsec” on page 7-131.
When configuring the IPsec policy, follow the
instructions in the site-to-site with manual
keying section. Use the settings indicated in
“Access Policies for a GRE Tunnel over IPsec”
on page 7-131.
Remote VPN Gateway or
Clients
VPN Type Configuration Guidelines