Although each IPsec VPN must be defined by a minimum set of parameters, each vendors' VPN gateway and/or VPN client provides a different step-by-step process to configure the parameters, and they often use different terminology than the Threat Management Services (TMS) zl Module. (See terminology comparison.) To configure an IPsec VPN on the TMS zl Module, you must first decide if you will use manual keying or IKEv1 to negotiate the IPsec SA Security Association encryption key. Consult the figure below to see which steps to follow for each key-exchange method. Click on a step in the figure to see how to configure the parameters for that step.
Click on a step below to see a short description of what each step includes.
|