TMS zl Management and Configuration Guide ST.1.1.100226
7-244
Virtual Private Networks
Configure a GRE over IPsec VPN with IKE
Figure 7-214. Retrieve CRL through SCEP Window
24. For Trusted Certificate, select the CA certificate that you imported
with SCEP.
25. Click Apply.
The CRL is displayed in the VPN > Certificates > CRL window.
Figure 7-215. VPN > Certificates > CRL Window (CRL Added)
Move to the next task: “Create an IPsec Proposal.”
Create an IPsec Proposal
Each IPsec proposal specifies the following:
■ IPsec mode (tunnel or transport)
■ IPsec security protocol:
• AH and a single authentication algorithm
• ESP, a single authentication algorithm, and a single encryption
algorithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.