TMS zl Management and Configuration Guide ST.1.0.090213
7-86
Virtual Private Networks
IPsec VPNs
4. For Policy Name, type an alphanumeric string between 1 and 10 characters.
The string must be unique to this policy.
5. The policy does not take effect until it is enabled. Select the Enable this
policy check box to enable the policy as soon as you finish it. Clear the
check box if you want to enable the policy later.
6. For Action, select how the TMS zl Module treats traffic that is selected for
this policy (see step 9):
• Bypass—Traffic is forwarded to its destination but is not secured by
the IPsec SA.
• Ignore—Traffic is discarded.
7. Select an option for Direction:
• Both
• Inbound
• Outbound
The default selection is Both, which means that the policy applies to both
inbound and outbound traffic.
8. For Position, type a number.
The position determines the order in which the TMS zl Module processes
IPsec policies. The module processes the policy with the lowest value first
(for example, position 1 before position 2). The position matters most
when policies have overlapping traffic selectors. In this case, assign the
highest position (lowest value) to the IPsec policy with the most specific
traffic selector.
Note that you can specify a position that is already used by another policy.
The new policy is inserted above the former policy. You can use the arrow
icons in the Tools column in the VPN > IPsec > IPsec Policies window to
rearrange policies. Remember the policy at the top of the display is the
first policy processed.
A default IPsec Bypass policy prevents all traffic from being encrypted by
the VPN engine; therefore, all IPsec policies that you configure must have
a higher priority than this default policy.
Next, you configure the VPN traffic selector, which determines which traffic
is selected by the policy. For example, the selector might specify all IP traffic
between 192.168.2.0/24 (a local network) and 192.168.3.0/24 (a remote net-
work).