Configuring Virtual Private Networking (VPN) Configure Internet Protocol security (IPsec)
Digi TransPort® Routers User Guide
473
Configure IPsec tunnels
Once the IKE parameters have been set-up, the next stage is to define the characteristics of the IPsec
tunnels, or encrypted routes. This includes items such as what source and destination addresses will
be connected by the tunnel and what type of encryption and authentication procedures will be applied
to the packets being tunneled. For obvious reasons it is essential that parameters such as encryption
and authentication are the same at each end of the tunnel. If they are not, then the two systems
cannot agree on which set of rules or policy to adopt for the IPsec tunnel, and communication cannot
occur.
ÉWeb
1. Go to Configuration > Network > Virtual Private Networking > IPsec > IPsec Tunnels
>IPsec n.