TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 96
SITE B: We have our firewall setup, but we do not have IPsec configuration in
place yet. We start by creating an IKE policy. We specify site-to-site as the
policy type and enter the TMS zl Module addresses for the Local and Remote
gateways. In our example, we will be using Pre-Shared keys, so we utilize the
same IP addresses for Identities. It is recommended that certificates be used for
customer deployments. See Section C in the HP ProCurve Threat
Management Solution Implementation Guide for more in-depth discussion.