TMS zl Management and Configuration Guide ST.1.1.100430
7-247
Virtual Private Networks
Configure a GRE over IPsec VPN with IKE
•3DES
• AES-128 (16)
• AES-192 (24)
• AES-256 (32)
The number in parentheses after AES options indicates the key length for
the algorithm in bytes.
8. If you selected either ESP or AH, for Authentication Algorithm, select one of
the following:
• None
You must not select None if you selected AH for the Security Protocol
or if you selected NULL for the ESP Encryption Algorithm.
•MD5
• SHA-1
•AES-XCBC
9. Click OK.
The IPsec proposal is displayed in the VPN > IPsec > IPsec Proposals window.
Figure 7-218. VPN > IPsec > IPsec Proposals Window (Proposal Added)
10. Click Save.
Create an IPsec Policy for a GRE over IPsec VPN That
Uses IKE
This section explains how to configure an IPsec policy for an IPsec SA that is
established for a GRE tunnel using IKE. The IPsec policy includes the settings
that are negotiated during IKE phase 2 and also selects traffic for the VPN
connection.