TMS zl Management and Configuration Guide ST.1.1.100226

7-29
Virtual Private Networks
Configure an IPsec Client-to-Site VPN
Figure 7-10. Add IKE Policy Window—Step 1 of 3
Remote endpoints will initiate the VPN connection. The TMS zl Module
will respond to their IKE messages.
Note Later you will configure firewall access policies to allow the IKE messages
from the remote endpoints.
Refer to Figure 7-11 for help configuring the next settings.