RUGGEDCOM ROX II
CLI User Guide
Table of Contents
xxiii
12.7.1Viewing Statistics for GRE Tunnels ................................................................................. 399
12.7.2Viewing a List of GRE Tunnels ....................................................................................... 400
12.7.3Adding a GRE Tunnel .................................................................................................... 401
12.7.4Configuring a DSCP Marking for GRE Tunnel Traffic ......................................................... 402
12.7.5Enabling/Disabling Keepalive Messages .......................................................................... 402
12.7.6Deleting a GRE Tunnel .................................................................................................. 403
12.8Managing IPsec Tunnels .......................................................................................................... 404
12.8.1IPsec Tunneling Concepts .............................................................................................. 404
12.8.1.1IPsec Modes ...................................................................................................... 405
12.8.1.2Supported Encryption Protocols .......................................................................... 405
12.8.1.3Public and Secret Key Cryptography .................................................................... 405
12.8.1.4X509 Certificates ............................................................................................... 406
12.8.1.5NAT Traversal .................................................................................................... 406
12.8.1.6Remote IPsec Client Support ............................................................................... 406
12.8.1.7IPsec and Router Interfaces ................................................................................ 407
12.8.2Configuring IPsec Tunnels ............................................................................................. 407
12.8.3Configuring Certificates and Keys .................................................................................. 408
12.8.4Viewing the IPsec Tunnel Status .................................................................................... 408
12.8.5Managing Pre-Shared Keys ............................................................................................ 409
12.8.5.1Viewing a List of Pre-Shared Keys ....................................................................... 410
12.8.5.2Adding a Pre-Shared Key .................................................................................... 410
12.8.5.3Deleting a Pre-Shared Key .................................................................................. 410
12.8.6Managing Connections ................................................................................................. 411
12.8.6.1Viewing a List of Connections ............................................................................. 411
12.8.6.2Adding a Connection ......................................................................................... 412
12.8.6.3Configuring Dead Peer Detection ........................................................................ 413
12.8.6.4Deleting a Connection ....................................................................................... 414
12.8.6.5Viewing the Status of a Connection .................................................................... 414
12.8.7Managing the Internet Key Exchange (IKE) Protocol ........................................................ 415
12.8.7.1Viewing a List of IKE Algorithms ......................................................................... 415
12.8.7.2Adding an IKE Algorithm .................................................................................... 416
12.8.7.3Deleting an IKE Algorithm .................................................................................. 416
12.8.8Managing the Encapsulated Security Payload (ESP) Protocol ............................................ 417
12.8.8.1Configuring ESP Encryption ................................................................................ 417
12.8.8.2Viewing a List of ESP Algorithms ......................................................................... 417
12.8.8.3Adding an ESP Algorithm ................................................................................... 418
12.8.8.4Deleting an ESP Algorithm ................................................................................. 418
12.8.9Configuring the Connection Ends .................................................................................. 419
12.8.10Managing Private Subnets ........................................................................................... 420
12.8.10.1Configuring Private Subnets for Connection Ends ............................................... 421