TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 114
10.5.5 Remote Access with Windows and L2TP over IPsec
Let’s examine our next VPN scenario the remote worker “dialing in” to
access resources at the main office. This section will detail the TMS zl
Module configuration. Detailed configuration for Windows XP and Vista
clients will not be discussed in this section. For more discussion on
configuration Windows and Macintosh VPN clients, see Section C in the HP
ProCurve Threat Management Solution Implementation Guide.
This diagram is very similar to the site-to-site diagram except we only have
one TMS zl Module. The protection needs haven’t changed – we still need to
protect the traffic over the Internet.
Figure 25
We will be specifying firewall access policies on the basis of group
membership. Users are specified on the TMS zl Module and are required to be
associated with a Group. When a user successfully “VPNs” into the TMS zl
Module, their group membership is determined and the access policies
associated to that group are put in place.
Figure 26