On this window, you configure IKEv1 policies, which are Step 1 in configuring an IPsec VPN with IKE and Step 2 in configuring an L2TP Layer 2 Tunneling Protocol over IPsec VPN. To see detailed instructions for configuring IPsec VPNs on the Threat Management Services (TMS) zl Module (including an explanation for the figure below), click here.
To see detailed instructions for configuring L2TP over IPsec VPNs on the TMS zl Module (including an explanation for the figure below), click here.
Click the Step 1 of 3Step 2 of 3
Step 3 of 3
|