TMS zl Management and Configuration Guide ST.1.1.100430
7-152
Virtual Private Networks
Configure an L2TP over IPsec VPN
14. Click Finish.
The IKE policy is displayed in the VPN > IPsec > IKEv1 Policies window.
Figure 7-126. VPN > IPsec > IKEv1 Policies (Client-to-Site Policy Added)
Create an IPsec Proposal for an L2TP over IPsec VPN
Each IPsec proposal specifies the following:
■ IPsec mode (tunnel or transport)
■ IPsec security protocol:
• AH and a single authentication algorithm
• ESP, a single authentication algorithm, and a single encryption
algorithm
You can configure multiple IPsec proposals. In a later task, you will specify a
proposal in an IPsec policy. The algorithm or algorithms in that proposal will
secure traffic that is part of IPsec tunnels (VPN connections) that are estab-
lished with that policy.
Follow these steps to configure an IPsec proposal:
1. In the left navigation bar of the Web browser interface, click VPN > IPsec.
2. Click the IPsec Proposals tab.
Figure 7-127. VPN > IPsec > IPsec Proposals Window