EasyManua.ls Logo

Patton electronics SmartNode Series - VPN Configuration

Default Icon
655 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
360
Chapter 32 VPN configuration
Chapter contents
Introduction........................................................................................................................................................361
Authentication ..............................................................................................................................................361
Encryption ....................................................................................................................................................361
Transport and tunnel modes .........................................................................................................................362
Permanent IKE Tunnels ..........................................................................................................................362
Key management ..........................................................................................................................................362
VPN configuration task list .................................................................................................................................363
Creating an IPsec transformation profile .......................................................................................................363
Creating an IPsec policy profile .....................................................................................................................363
Creating/modifying an outgoing ACL profile for IPsec .................................................................................365
Configuration of an IP interface and the IP router for IPsec ..........................................................................366
Displaying IPsec configuration information ..................................................................................................366
Debugging IPsec ...........................................................................................................................................367
Key management (IKE) .......................................................................................................................................368
Main differences between manual & IKE IPSEC configurations .............................................................368
Creating an ISAKMP transform profile ...................................................................................................369
Creating an ISAKMP IPSEC policy profile .............................................................................................370
Creating/modifying an outgoing ACL profile for IPSEC .........................................................................371
Configuration of an IP interface and the IP router for IPSEC .................................................................371
Policy matching ......................................................................................................................................371
Sample configuration snippet ..................................................................................................................371
Troubleshooting ...........................................................................................................................................372
Encrypted Voice - Performance considerations ....................................................................................................373
Performance considerations ...........................................................................................................................373
Enabling RTP encryption support.......................................................................................................................373
Using an alternate source IP address for specific destinations...............................................................................374
Sample configurations .........................................................................................................................................375
IPsec tunnel, DES encryption .......................................................................................................................375
SmartNode configuration ........................................................................................................................375
Cisco router configuration .......................................................................................................................376
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ..................376
SmartNode configuration ........................................................................................................................376
Cisco router configuration .......................................................................................................................376
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96 ................377
SmartNode configuration ........................................................................................................................377
Cisco router configuration .......................................................................................................................377

Table of Contents