TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 36
In addition to tunnels providing secure access for administrators of senstive
information processing hosts as previously shown in Figure 9: Data Center
Security Control Point Internal VPN, the tunnels from the remote sensitive
information enclaves back to the data center can also be joined into this
protected network.
See Chapter 7, “Virtual Private Networks,” of the HP ProCurve Threat
Management Services zl Module Management and Configuration Guide for
detailed information on how to configure IKE policies, IPsec proposals, IPsec
policies, LT2P over IPsec, GRE tunnels, and the necessary firewall policies to
support various VPN tunnel permutations to pass through.
Note: In some of the above TMS zl Module use cases, a Network Address
Translation (NAT) configuration may also need to be included in the
firewall configuration to properly pass traffic. This would very often be
the case for the Perimeter design presented earlier. For more information
on this topic, see Chapter 5, “Network Address Translation,” of the HP
ProCurve Threat Management Services zl Module Management and
Configuration Guide. In addition, Section 10 of this document contains a
couple of simple examples using NAT with screenshots of the
configuration screens.