TMS zl Management and Configuration Guide ST.1.1.100430

7-151
Virtual Private Networks
Configure an L2TP over IPsec VPN
b. For Encryption Algorithm, select one of these protocols, listed from
least secure (and least processor-intensive) to most:
–DES
AES-128 (16)
–3DES
AES-192 (24)
AES-256 (32)
The number in parentheses after AES options indicates the key length
for the algorithm in bytes.
c. For Authentication Algorithm, select one of these protocols, listed from
least secure (and least processor-intensive) to most:
–MD5
SHA-1
d. For SA Lifetime in Seconds, leave the default, 28800.
Remember that this setting applies to the IKE SA, which is a tempo-
rary tunnel used only to establish the IPsec SA.
12. Click Next.
13. Under XAUTH Configuration (Optional), leave the default, Disable XAUTH.
Figure 7-125. Add IKE Policy Window—Step 3 of 3