TMS zl Management and Configuration Guide ST.1.2.100916

15
Configure an IPsec Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27
Create an IKE Policy for a Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . . 7-28
Install Certificates for IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Install Certificates Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Install Certificates Using SCEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46
Create Named Objects for the VPN (Optional) . . . . . . . . . . . . . . . . . . . . . 7-51
Create an IPsec Proposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52
Create an IPsec Policy for a Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . 7-55
Create Access Policies for an IPsec Client-to-Site VPN . . . . . . . . . . . . . . 7-68
Verify Routes for the IPsec Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . 7-75
Configure an IPsec Site-to-Site VPN with IKE . . . . . . . . . . . . . . . . . . . . . . 7-77
Create Named Objects for the VPN (Optional) . . . . . . . . . . . . . . . . . . . . . 7-78
Create an IKE Policy for a Site-to-Site IPsec VPN . . . . . . . . . . . . . . . . . . 7-79
Install Certificates for IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-88
Install Certificates Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-88
Install Certificates Using SCEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-98
Create an IPsec Proposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-104
Create an IPsec Policy for a Site-to-Site VPN that Uses IKE . . . . . . . . . 7-106
Create Access Policies for an IPsec Site-to-Site VPN that
Uses IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-117
Verify Routes for an IPsec Site-to-Site VPN . . . . . . . . . . . . . . . . . . . . . 7-123
Configure an IPsec Site-to-Site VPN with Manual Keying . . . . . . . . . . . . 7-124
Create Named Objects for the VPN (Optional) . . . . . . . . . . . . . . . . . . . . 7-124
Create an IPsec Proposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-125
Create an IPsec Policy That Uses Manual Keying . . . . . . . . . . . . . . . . . 7-128
Create Access Policies for an IPsec Site-to-Site VPN with
Manual Keying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-138
Verify Routes for an IPsec Site-to-Site VPN . . . . . . . . . . . . . . . . . . . . . 7-141
Layer 2 Tunneling Protocol (L2TP) over IPsec Concepts . . . . . . . . . . . . 7-143
Configure an L2TP over IPsec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-144
Create Named Objects for the VPN (Optional) . . . . . . . . . . . . . . . . . . . . 7-145
Create an IKE Policy for an L2TP over IPsec VPN . . . . . . . . . . . . . . . . 7-146
Create an IPsec Proposal for an L2TP over IPsec VPN . . . . . . . . . . . . . 7-153
Create an IPsec Policy for an L2TP over IPsec VPN . . . . . . . . . . . . . . . 7-156