TMS zl Management and Configuration Guide ST.1.0.090213
7-53
Virtual Private Networks
IPsec VPNs
Figure 7-45. VPN > Certificates > CRL Window (CRL Added)
Move to the next task: “Create an IPsec Proposal.”
Create an IPsec Proposal
Each IPsec proposal specifies the following:
■ IPsec mode (tunnel or transport)
■ IPsec security protocol:
• AH and a single authentication algorithm
• ESP, a single authentication algorithm, and a single encryption
algorithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal:
1. In the left navigation bar of the Web browser interface, select VPN > IPsec.
2. Click the IPsec Proposals tab.
Figure 7-46. VPN > IPsec > IPsec Proposals Window
3. Click Add IPsec Proposal. The Add IPsec Proposal window is displayed.