TMS zl Management and Configuration Guide ST.1.1.100430
7-109
Virtual Private Networks
Configure an IPsec Site-to-Site VPN with IKE
Note If your traffic selector will include management traffic, you must configure a
Bypass policy with top priority that selects the management traffic, or you will
be locked out of the Web browser interface. If you do lock yourself out, reboot
the module, but DO NOT SAVE the configuration.
See “Configure Bypass and Deny IPsec Policies” on page 7-351.
If your traffic selector will include traffic that is also selected for NAT, you
must create a NAT exclusion policy. See “Exclusion NAT Policies” in
Chapter 5: “Network Address Translation.”
Refer to Figure 7-94 for help in configuring the next settings.
Figure 7-94. Example IPsec Site-to-Site VPN
8. For Traffic Selector, configure these settings:
a. For Protocol, specify the protocol for traffic allowed on the VPN:
– Any—Any IP protocol. Select this option when you want to allow
all traffic between local and remote endpoints.
– TCP or UDP—Select this option in conjunction with a remote port
to allow local traffic destined for specific services in the remote
network. Select this option in conjunction with a local port to
allow remote traffic destined for specific services in the local
network.
– ICMP—Select this option when you want to allow only ICMP
traffic.
– IP Protocols—Select one of these Layer 3 protocols, which are
listed by their IANA IP Protocol numbers.
Service objects and service groups will not appear in this list.