EasyManua.ls Logo

Nokia IPSO 4.0 - Page 13

Nokia IPSO 4.0
510 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Nokia Network Voyager IPSO 4.0 Reference Guide 13
Configuring Secure Shell Authorized Keys . . . . . . . . . . . . . . . . 308
Changing Secure Shell Key Pairs . . . . . . . . . . . . . . . . . . . . . . . 309
Managing User RSA and DSA Identities. . . . . . . . . . . . . . . . . . 310
Tunneling HTTP Over SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Network Voyager Session Management . . . . . . . . . . . . . . . . . . . 311
Enabling Enabling or Disabling Session Management . . . . . . . 312
Configuring Session Timeouts . . . . . . . . . . . . . . . . . . . . . . . . . 312
Authentication, Authorization, and Accounting (AAA) . . . . . . . . . 313
Creating an AAA Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 313
Configuring RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Configuring TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Deleting an AAA Authentication Server Configuration . . . . . . . 322
Changing an AAA Configuration . . . . . . . . . . . . . . . . . . . . . . . . 323
Deleting an AAA Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 327
Encryption Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Enabling Encryption Accelerator Cards. . . . . . . . . . . . . . . . . . . 328
Monitoring Cryptographic Acceleration . . . . . . . . . . . . . . . . . . . 328
IPSec Tunnels (IPSO Implementation) . . . . . . . . . . . . . . . . . . . . 328
Using PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
IPSec Implementation in IPSO . . . . . . . . . . . . . . . . . . . . . . . . . 332
IPSec Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Creating an IPSec Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Creating an IPSec Tunnel Rule. . . . . . . . . . . . . . . . . . . . . . . . . 341
Transport Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
IPSec Tunnel Rule Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
IPSec Transport Rule Example. . . . . . . . . . . . . . . . . . . . . . . . . 346
Changing the Local/Remote Address or Local/Remote
Endpoint of an IPSec Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . 348
Removing an IPSec Tunnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Miscellaneous Security Settings. . . . . . . . . . . . . . . . . . . . . . . . . . 349
9 Configuring Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Routing Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

Table of Contents

Related product manuals