TMS zl Management and Configuration Guide ST.1.1.100430

7-106
Virtual Private Networks
Configure an IPsec Site-to-Site VPN with IKE
•DES
•3DES
AES-128 (16)
AES-192 (24)
AES-256 (32)
The number in parentheses after AES options indicates the key length for
the algorithm in bytes.
8. If you selected either ESP or AH, for Authentication Algorithm, select one of
the following:
None
You must not select None if you selected AH for the Security Protocol
or if you selected NULL for the ESP Encryption Algorithm.
•MD5
SHA-1
•AES-XCBC
9. Click OK.
The IPsec proposal is displayed in the VPN > IPsec > IPsec Proposals window.
Figure 7-91. VPN > IPsec > IPsec Proposals Window (Proposal Added)
10. Click Save.
Create an IPsec Policy for a Site-to-Site VPN that
Uses IKE
This section explains how to configure an IPsec policy for an IPsec SA that is
established between two gateway devices using IKE. The IPsec policy
includes the settings that are negotiated during IKE phase 2 and also selects
traffic for the VPN connection.