TMS zl Management and Configuration Guide ST.1.1.100430

7-228
Virtual Private Networks
Configure a GRE over IPsec VPN with IKE
Figure 7-188. Add IKE Policy Window—Step 3 of 3
14. If you want, configure XAUTH, which is an optional additional layer of
security. Otherwise, leave Disable XAUTH selected and move to step 15.
You can configure the TMS zl Module to act either as a client (authenticate
itself) or as a server (authenticate the remote gateway):
Select TMS acts as XAUTH Server.