EasyManuals Logo
Home>RuggedCom>Switch>RUGGEDBACKBONE RX5000

RuggedCom RUGGEDBACKBONE RX5000 User Manual

RuggedCom RUGGEDBACKBONE RX5000
440 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #311 background imageLoading...
Page #311 background image
30. Tunnelling
ROX™ v2.2 User Guide 311 RuggedBackbone™ RX5000
Figure 30.12. ESP table
If data is configured, the path to the ESP table will be tunnel/ipsec/connection/{line module}/esp.
Figure 30.13. ESP Key Settings
If data is configured, the path to the ESP Key Settings form will be to click on esp/{line module}.
ESP pertains to the Phase 2 encryption/authentication algorithm to be used for the connection.
Cipher Algorithm
Synopsis: string - one of the following keywords { any, aes128, aes192, aes256, aes, 3des }
Cipher algorithm.
Hash Method
Synopsis: string - one of the following keywords { any, md5, sha1 }
Hash method.
Figure 30.14. IKE table
If data is configured, the path to the IKE table will be tunnel/ipsec/connection/{line module}/ike.
IKE pertains to the Phase 1 encryption/authentication algorithm to be used for the connection. A Key
Settings Form like the ESP Key Settings Form is also used for IKE.
Cipher Algorithm
Synopsis: string - one of the following keywords { any, aes128, aes192, aes256, aes, 3des }
Cipher algorithm.
Hash Method
Synopsis: string - one of the following keywords { any, md5, sha1 }
Hash method.
Modpgroup
Synopsis: string - one of the following keywords { any, modp8192, modp6144, modp4096,
modp3072, modp2048, modp1536, modp1024 }

Table of Contents

Other manuals for RuggedCom RUGGEDBACKBONE RX5000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the RuggedCom RUGGEDBACKBONE RX5000 and is the answer not in the manual?

RuggedCom RUGGEDBACKBONE RX5000 Specifications

General IconGeneral
BrandRuggedCom
ModelRUGGEDBACKBONE RX5000
CategorySwitch
LanguageEnglish

Related product manuals