TMS zl Management and Configuration Guide ST.1.2.100916

A-133
Command-Line Reference
IPsec Policy Context
action
To specify how the TMS zl Module treats traffic that is selected by this policy,
enter the following command:
Syntax: action <apply | bypass | deny>
Use the apply option for a policy that selects traffic to be secured and sent
over a VPN connection. Use the bypass option for a policy that selects traffic
that is not secured by a VPN connection but is forwarded to its destination.
Use the deny option to select traffic that should be dropped entirely.
After entering this command, you move to the action context with the avail-
able commands. You will use this action context to enter other commands for
the IPsec policy. See “IPsec Policy Apply Context” on page A-137, “IPsec Policy
Bypass Context” on page A-152, or “IPsec Policy Deny Context” on page A-155.
apply
Once you have configured all parts of the IPsec policy, you must apply the
policy. The apply command verifies that all required settings are configured
and then adds or edits the IPsec policy. (If the requirements are not met, the
command does not take effect, and an error message indicates which settings
are missing.) Enter the following command:
Syntax: apply
This command is also available from the IPsec policy apply, IPsec policy
bypass, IPsec policy deny, IPsec auto keys, IPsec manual keys, and IPsec IRAS
contexts.
enable
To enable (or disable) an IPsec policy, enter the following command:
Syntax: [no] enable
position
The position determines the order in which the TMS zl Module processes IPsec
policies. To set the policy’s position, enter the following command:
Syntax: [no] position <position>