TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 94
SITE B: We will need to add the ability to negotiate an IPsec session to our
access policies. We will need to allow ISAKMP to our access policies as it
performs the IPsec negotiation. We will use the IP addresses of the TMS zl
Modules as our source and destination. Also, the ISP is potentially using
NAT within the Internet Cloud, therefore, we should add a NAT traversal
access policy as well.