TMS zl Management and Configuration Guide ST.1.1.100226

7-102
Virtual Private Networks
Configure an IPsec Site-to-Site VPN with IKE
Figure 7-87. Retrieve CRL through SCEP Window
24. For Trusted Certificate, select the CA certificate that you imported
with SCEP.
25. Click Apply.
The CRL is displayed in the VPN > Certificates > CRL window.
Figure 7-88. VPN > Certificates > CRL Window (CRL Added)
Move to the next task: “Create an IPsec Proposal.”
Create an IPsec Proposal
Each IPsec proposal specifies the following:
IPsec mode (tunnel or transport)
IPsec security protocol:
AH and a single authentication algorithm
ESP, a single authentication algorithm, and a single encryption
algorithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal: