TMS zl Management and Configuration Guide ST.1.0.090213
7-22
Virtual Private Networks
IPsec VPNs
6. Create necessary firewall access policies.
See “Configure Firewall Access Policies for Your VPN” on page 7-112.
7. Create a static route, if necessary.
See “Verify Routes for the VPN” on page 7-137.
Create Named Objects for the VPN (Optional)
You might want to configure named objects that you can use for the VPN. See
“Named Objects” in Chapter 4: “Firewall” for instructions about configuring
the objects.
IPsec Policy Traffic Selector. For the IPsec policy traffic selector, you can
configure named objects for the following:
■ Local Address—Single-entry IP, range, or network address object (You
cannot select an address object for this field if you will be configuring IKE
mode config.)
■ Remote Address—Single-entry IP, range, or network address object
Firewall Access Policies. For the VPN firewall access policies, you can
configure the following:
■ Service—Service object or service group
■ Source—Any kind of address object or address group
■ Destination—Any kind of address object or address group
Create an IKE Policy
You can create two types of IKE policies: one type for site-to-site VPNs and
one type for client-to-site VPNs (remote access for individual endpoints). Read
the appropriate section:
■ “Create an IKE Policy for a Site-to-Site IPsec VPN” on page 7-22
■ “Create an IKE Policy for a Client-to-Site IPsec VPN” on page 7-31
Create an IKE Policy for a Site-to-Site IPsec VPN. Follow these steps
to create an IKE policy that the TMS zl Module can use to negotiate a site-to-
site VPN:
1. In the left navigation bar of the Web browser interface, select VPN > IPsec.
2. Click the IKEv1 Policies tab.