EasyManuals Logo

Siemens RUGGEDCOM ROX II User Manual

Siemens RUGGEDCOM ROX II
798 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #23 background imageLoading...
Page #23 background image
RUGGEDCOM ROX II
CLI User Guide
Table of Contents
xxiii
12.7.1Viewing Statistics for GRE Tunnels ................................................................................. 399
12.7.2Viewing a List of GRE Tunnels ....................................................................................... 400
12.7.3Adding a GRE Tunnel .................................................................................................... 401
12.7.4Configuring a DSCP Marking for GRE Tunnel Traffic ......................................................... 402
12.7.5Enabling/Disabling Keepalive Messages .......................................................................... 402
12.7.6Deleting a GRE Tunnel .................................................................................................. 403
12.8Managing IPsec Tunnels .......................................................................................................... 404
12.8.1IPsec Tunneling Concepts .............................................................................................. 404
12.8.1.1IPsec Modes ...................................................................................................... 405
12.8.1.2Supported Encryption Protocols .......................................................................... 405
12.8.1.3Public and Secret Key Cryptography .................................................................... 405
12.8.1.4X509 Certificates ............................................................................................... 406
12.8.1.5NAT Traversal .................................................................................................... 406
12.8.1.6Remote IPsec Client Support ............................................................................... 406
12.8.1.7IPsec and Router Interfaces ................................................................................ 407
12.8.2Configuring IPsec Tunnels ............................................................................................. 407
12.8.3Configuring Certificates and Keys .................................................................................. 408
12.8.4Viewing the IPsec Tunnel Status .................................................................................... 408
12.8.5Managing Pre-Shared Keys ............................................................................................ 409
12.8.5.1Viewing a List of Pre-Shared Keys ....................................................................... 410
12.8.5.2Adding a Pre-Shared Key .................................................................................... 410
12.8.5.3Deleting a Pre-Shared Key .................................................................................. 410
12.8.6Managing Connections ................................................................................................. 411
12.8.6.1Viewing a List of Connections ............................................................................. 411
12.8.6.2Adding a Connection ......................................................................................... 412
12.8.6.3Configuring Dead Peer Detection ........................................................................ 413
12.8.6.4Deleting a Connection ....................................................................................... 414
12.8.6.5Viewing the Status of a Connection .................................................................... 414
12.8.7Managing the Internet Key Exchange (IKE) Protocol ........................................................ 415
12.8.7.1Viewing a List of IKE Algorithms ......................................................................... 415
12.8.7.2Adding an IKE Algorithm .................................................................................... 416
12.8.7.3Deleting an IKE Algorithm .................................................................................. 416
12.8.8Managing the Encapsulated Security Payload (ESP) Protocol ............................................ 417
12.8.8.1Configuring ESP Encryption ................................................................................ 417
12.8.8.2Viewing a List of ESP Algorithms ......................................................................... 417
12.8.8.3Adding an ESP Algorithm ................................................................................... 418
12.8.8.4Deleting an ESP Algorithm ................................................................................. 418
12.8.9Configuring the Connection Ends .................................................................................. 419
12.8.10Managing Private Subnets ........................................................................................... 420
12.8.10.1Configuring Private Subnets for Connection Ends ............................................... 421

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Siemens RUGGEDCOM ROX II and is the answer not in the manual?

Siemens RUGGEDCOM ROX II Specifications

General IconGeneral
BrandSiemens
ModelRUGGEDCOM ROX II
CategoryNetwork Hardware
LanguageEnglish

Related product manuals