TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 100
SITE B. Next we will specify an IPsec Policy. The IPsec Policy will
determine which traffic is protected by IPsec.
In most cases, our traffic selector Actionwill be Apply, the “Direction will
be Both, and the “Protocol”will be Any. Here is where using the IP address as
the basis for our IPsec Traffic Selector becomes important. We want to
specify IP addresses between Site B and Site A. The easier it is to specify IP
addresses that correspond to these sites, the easier it is to configure. Also, we
want to select the IPsec Proposal we configured previously.