TMS zl Management and Configuration Guide ST.1.1.100226
7-84
Virtual Private Networks
Configure an IPsec Site-to-Site VPN with IKE
Figure 7-60. Add IKE Policy Window—Step 3 of 3
14. If you want, configure XAUTH, which is an optional additional layer of
security. Otherwise, leave Disable XAUTH selected and move to step 15.
You can configure the TMS zl Module to act either as a client (authenticate
itself) or as a server (authenticate the remote gateway):
• Select TMS acts as XAUTH Server.