TMS zl Management and Configuration Guide ST.1.1.100226
7-34
Virtual Private Networks
Configure an IPsec Client-to-Site VPN
Figure 7-13. Add IKE Policy Window—Step 3 of 3
i. For Authentication Type, select Generic or CHAP.
To complete the configuration, you must follow these steps as well:
i. If you have not already done so, configure a group or groups for
the remote users.
Configure the user group in the Network > Authentication > Fire-
wall/XAUTH Users window.
ii. Configure usernames and passwords for the remote users in one
of these locations:
– An external RADIUS server—Remember, to add the RADIUS
server in the Network > Authentication > RADIUS window.
– On the module itself (in the Network > Authentication > Firewall/
XAUTH Users window)
iii. When you later configure firewall access policies, select the
remote users’ groups from the User Group list before you configure
policies that control their traffic. See “Create Access Policies for
an IPsec Client-to-Site VPN” on page 7-67.
For more information on setting up authentication, see “User Authen-
tication” in Chapter 4: “Firewall.”