TMS zl Management and Configuration Guide ST.1.1.100226
7-153
Virtual Private Networks
Configure an L2TP over IPsec VPN
7. Select one of the following for Encryption Algorithm, referring to Table 7-17:
•NULL
If you select this option, traffic will not be encrypted.
•DES
•3DES
• AES-128 (16)
• AES-192 (24)
• AES-256 (32)
The number in parentheses after AES options indicates the key length for
the algorithm in bytes.
8. For Authentication Algorithm, select one of the following, referring to
Table 7-17:
• None
You must not select this option if you have selected NULL in the
previous step.
•MD5
• SHA-1
9. Click OK.
The IPsec proposal is displayed in the VPN > IPsec > IPsec Proposals window.
Figure 7-129. VPN > IPsec > IPsec Proposals Window (Proposal Added)
10. Click Save.
Create an IPsec Policy for an L2TP over IPsec VPN
This section explains how to configure an IPsec policy for an L2TP over IPsec
VPN. The IPsec policy selects L2TP traffic between the TMS zl Module and
remote endpoints. It also includes settings that will be negotiated during IKE
phase 2.