EasyManuals Logo

Lantronix SLC 8000 User Manual

Lantronix SLC 8000
396 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #82 background imageLoading...
Page #82 background image
6: Basic Parameters
SLCâ„¢ 8000 Advanced Console Manager User Guide 82
2. Enter the following:
Enable VPN Tunnel Select to create a tunnel.
Name The name assigned to the tunnel. Required to create a tunnel.
Ethernet Port Select Ethernet port 1 or 2.
Remote Host The IP address of the remote host's public network interface. The special
value of any can be entered if the remote host is a roaming user who may
not have the same IP address each time a tunnel is created. In this case, it
is recommended that the Remote Id also be configured.
Remote Id How the remote host should be identified for authentication. The Id is used
to select the proper credentials for communicating with the remote host.
Remote Hop/Router If the remote host is behind a gateway, this specifies the IP address of the
gateway's public network interface.
Remote Subnet(s) One or more subnets behind the remote host, expressed in CIDR notation
(IP address/mask bits). If multiple subnets are specified, the subnets should
be separated by a comma.
Local Id How the SLC 8000 advanced console manager should be identified for
authentication. The Id is used by the remote host to select the proper
credentials for communicating with the SLC advanced console manager.
Local Hop/
Router
If the SLC unit is behind a gateway, this specifies the IP address of the
gateway's public network interface.
Local Subnet(s) One or more subnets behind the SLC 8000 advanced console manager,
expressed in CIDR notation (IP address/mask bits). If multiple subnets are
specified, the subnets should be separated by a comma.
IKE Negotiation The Internet Key Exchange (IKE) protocol is used to exchange security
options between two hosts who want to communicate via IPSec. The first
phase of the protocol authenticates the two hosts to each other and
establishes the Internet Security Association Key Management Protocol
Security Association (ISAKMP SA). The second phase of the protocol
establishes the cryptographic parameters for protecting the data passed
through the tunnel, which is the IPSec Security Association (IPSec SA). The
IPSec SA can periodically be renegotiated to ensure security. The IKE
protocol can use one of two modes: Main Mode, which provides identity
protection and takes longer, or Aggressive Mode, which provides no
identity protection but is quicker. With Aggressive Mode, there is no
negotiation of which cryptographic parameters will be used; each side must
give the correct cryptographic parameters in the initial package of the
exchange, otherwise the exchange will fail. If Aggressive Mode is used, the
IKE Encryption, IKE Authentication, and IKE DH Group must be
specified.

Table of Contents

Other manuals for Lantronix SLC 8000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lantronix SLC 8000 and is the answer not in the manual?

Lantronix SLC 8000 Specifications

General IconGeneral
Rack mountingYes
Console portRJ-45
Serial ports quantity48
USB 2.0 ports quantity2
AC input voltage120-230 V
Power source typeAC
AC input frequency50 - 60 Hz
Weight and Dimensions IconWeight and Dimensions
Weight5030 g
Dimensions (WxDxH)436.9 x 304.8 x 43.18 mm

Related product manuals