TMS zl Management and Configuration Guide ST.1.1.100430

7-7
Virtual Private Networks
Introduction
If you know which type of VPN you want to configure, see Table 7-1 for the
page at which the configuration instructions begin. (The table also indicates
where you can find general background information on the technologies
used.)
Table 7-1. VPN Configuration Instructions
For guidelines on selecting a VPN, see Table 7-2, which shows the correct VPN
type for various types of VPN clients or remote gateways. The table also
indicates where to find configuration instructions.
VPN Type Configuration Instructions Concepts
Client-to-site—IPsec with
IKE v1
“Configure an IPsec Client-to-Site VPN” on
page 7-28
“IPsec Concepts” on page 7-9
Site-to-site—IPsec with
IKEv1
“Configure an IPsec Site-to-Site VPN with
IKE” on page 7-77
Site-to-site—IPsec with
manual keying
“Configure an IPsec Site-to-Site VPN with
Manual Keying” on page 7-123
Client-to-site—L2TP over
IPsec
“Configure an L2TP over IPsec VPN” on page
7-143
IPsec Concepts” on page 7-9
Layer 2 Tunneling Protocol (L2TP) over
IPsec Concepts” on page 7-142
Site-to-site—GRE tunnel “Configure a GRE Tunnel” on page 7-188 Generic Routing Encapsulation (GRE)
Concepts” on page 7-184
Site-to-site—GRE over
IPsec with IKE v1
“Configure a GRE over IPsec VPN with IKE”
on page 7-209
IPsec Concepts” on page 7-9
Generic Routing Encapsulation (GRE)
Concepts” on page 7-184
Site-to-site—GRE over
IPsec with manual keying
“Configure a GRE over IPsec VPN with
Manual Keying” on page 7-265