TMS zl Management and Configuration Guide ST.1.0.090213

7-210
Virtual Private Networks
Configure the VPN Client
Figure 7-175. Windows XP—IKE Security
Algorithms Window
64. Configure settings to match the settings in the TMS zl Module’s IKE policy:
a. For Integrity algorithm, match the module’s IKE authentication algo-
rithm setting.
b. For Encryption algorithm, match the module’s IKE encryption algo-
rithm setting.
c. For Diffie-Hellman Group, match the module’s DH group setting.
Table 7-15 displays the default settings for a TMS zl Module IKE policy.
Table 7-15. Default TMS zl Module IKE Settings
d. Click OK to close the IKE Security Algorithms window.
65. Click OK to close the Key Exchange Security Methods window.
66. Click OK to close the Key Exchange Settings window.
67. Click Close to close the <Policy name> Properties window.
68. Right-click the policy that you just created and click Assign to start
enforcing the IPsec policy.
Parameter Default Setting
Authentication Algorithm MD5
Encryption Algorithm 3DES
Diffie-Hellman (DH) Group 1