TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 99
SITE B: Next we move to IPsec Proposals. The image below shows what we
want configured for a site-to-site deployment. Be sure to use the ESP Security
Protocol. For more security, you can select a different authentication
algorithm other than the default of MD5. Click OK to complete the IPsec
Proposal configuration.