TMS zl Management and Configuration Guide ST.1.0.090213

7-201
Virtual Private Networks
Configure the VPN Client
45. In the Custom Security Method Settings window, select settings that match
the IPsec proposal and IPsec policy settings on the TMS zl Module:
a. Select the Data integrity and encryption (ESP) check box.
b. For Integrity algorithm, match the authentication algorithm in the
module’s IPsec proposal.
c. For Encryption algorithm, match the encryption algorithm in the mod-
ule’s IPsec proposal.
d. If you configured an SA lifetime in kilobytes in the module’s IPsec
policy, under Session key settings, select the Generate a new key every
check box on the left. Then type the matching number in the box
below.
e. If you configured an SA lifetime in seconds in the module’s IPsec
policy, under Session key settings, select the Generate a new key every
check box on the right. Then type the matching number in the box
below.
Table 7-14 displays the default settings for an IPsec proposal and IPsec
policy on the TMS zl Module.
Table 7-14. Default TMS zl Module IPsec Settings
Parameter Default Setting
Protocol ESP
Encryption Algorithm 3DES
Authentication Algorithm MD5
SA Lifetime in Seconds 28800
SA Lifetime in Kilobytes 0 (None)