TMS zl Management and Configuration Guide ST.1.2.100916

7-146
Virtual Private Networks
Configure an L2TP over IPsec VPN
Figure 7-120. Example L2TP over IPsec VPN
You can, of course, configure other objects that are appropriate for your
environment. And you might choose not to configure some of the objects. For
example, you might not know the actual IP address of every remote VPN client,
particularly when remote users connect through the Internet. Or the IP
addresses might not be contiguous, preventing you from placing them in a
single-entry object (which are required for address objects used in VPNs).
Create an IKE Policy for an L2TP over IPsec VPN
Follow these steps to create an IKE policy that the TMS zl Module can use to
negotiate VPN connections with remote L2TP clients:
1. In the left navigation bar of the Web browser interface, click VPN > IPsec.
2. Click the IKEv1 Policies tab.