TMS zl Management and Configuration Guide ST.1.1.100226

7-150
Virtual Private Networks
Configure an L2TP over IPsec VPN
c. For Authentication Algorithm, select one of these protocols, listed from
least secure (and least processor-intensive) to most:
–MD5
SHA-1
d. For SA Lifetime in Seconds, leave the default, 28800.
Remember that this setting applies to the IKE SA, which is a tempo-
rary tunnel used only to establish the IPsec SA.
12. Click Next.
13. Under XAUTH Configuration (Optional), leave the default, Disable XAUTH.
Figure 7-125. Add IKE Policy Window—Step 3 of 3
14. Click Finish.
The IKE policy is displayed in the VPN > IPsec > IKEv1 Policies window.