TMS zl Management and Configuration Guide ST.1.1.100226

7-123
Virtual Private Networks
Configure an IPsec Site-to-Site VPN with Manual Keying
See “Named Objects” in Chapter 4: “Firewall” for step-by-step instructions for
configuring objects.
Table 7-11. Possible Named Objects for an IPsec Site-to-Site VPN with Manual
Keying
Figure 7-104. Example IPsec Site-to-Site VPN
Create an IPsec Proposal
Each IPsec proposal specifies the following:
IPsec mode (tunnel or transport)
IPsec security protocol:
AH and a single authentication algorithm
ESP, a single authentication algorithm, and a single encryption
algorithm
Figure
Reference
Named Object Type Named Object Description Location Where the Named
Object is Specified
2 Single-entry IP, range, or network
address objects
The IP addresses of local
endpoints that are allowed to send
traffic over the VPN
Local Address in the IPsec
policy traffic selector
Source or Destination for
firewall access policies that
permit traffic sent across the
VPN
4 Single-entry or multiple-entry IP,
range, or network address objects
The IP addresses of endpoints
behind the remote VPN gateway
Remote Address in the IPsec
policy traffic selector
Source or Destination for
firewall access policies that
permit traffic sent across the
VPN