-
Select Firewall > Access Policies > Unicast.
-
Click Add a Policy.
-
Permit IKE traffic from the remote clients to the TMS zl Module:
-
Ensure that the user group is None.
-
For Action, accept the default: Permit Traffic.
-
For From, select EXTERNAL.
-
For To, select SELF.
-
For Service, select isakmp.
-
For Source, select L2TPclients.
-
For Destination, select localVPNgate.
-
Select the Enable logging on this Policy check box.

|
Because policy logging is processor-intensive, it is not recommended that you enable logging permanently. Use policy logging for troubleshooting and testing only.
|
-
Click Apply.
-
Permit L2TP traffic from the remote clients to the TMS zl Module:
-
For Action, accept the default: Permit Traffic.
-
For From, select EXTERNAL.
-
For To, select SELF.
-
For Service, select l2tp-udp.
-
For Source, select L2TPclients.
-
For Destination, select localVPNgate.
-
Click Apply.
-
Permit traffic from VLAN44 to the remote clients.
-
From the User Group list, select L2TPuserGP.
-
For Action, accept the default: Permit Traffic.
-
For From, select INTERNAL.
-
For To, select EXTERNAL.
-
For Service, select Any Service.
-
For Source, select VLAN44.
-
For Destination, select L2TPclientsVIR.
-
Click Apply.
-
Permit traffic from the remote clients to VLAN44.
-
For Action, accept the default: Permit Traffic.
-
For From, select EXTERNAL.
-
For To, select INTERNAL.
-
For Service, select Any Service.
-
For Source, select L2TPclientsVIR.
-
For Destination, select VLAN44.
-
Click Apply.
-
Click Close.
|
-
Click the Security tab.
-
Click IPSec Settings.
-
Select the Use pre-shared key for authentication check box and type WindowsL2tpKEY.
-
Click OK to close the Main Campus Properties window and return to the Connect Main Campus window.
-
Click Connect. After a minute or so, you should see a message that informs you that the connection was successful.
|