TMS zl Management and Configuration Guide ST.1.0.090213
7-28
Virtual Private Networks
IPsec VPNs
Figure 7-12. Add IKE Policy Window—Step 3 of 3
14. Configure XAUTH, which is an optional additional layer of security. You
can configure the TMS zl Module to act either as a client (authenticate
itself) or as a server (authenticate the remote gateway):
•Select Enable XAUTH Client: