EasyManua.ls Logo

Siemens RX1500

Siemens RX1500
856 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
RUGGEDCOM ROX II
User Guide
xxii
5.28.1.5 NAT Traversal ................................................................................................... 614
5.28.1.6 Remote IPsec Client Support ............................................................................. 615
5.28.1.7 IPsec and Router Interfaces ............................................................................... 615
5.28.2 Configuring IPsec Tunnels ............................................................................................ 615
5.28.3 Configuring Certificates and Keys ................................................................................. 616
5.28.4 Viewing the IPsec Tunnel Status ................................................................................... 617
5.28.5 Managing Pre-Shared Keys .......................................................................................... 618
5.28.5.1 Viewing a List of Pre-Shared Keys ..................................................................... 618
5.28.5.2 Adding a Pre-Shared Key .................................................................................. 618
5.28.5.3 Deleting a Pre-Shared Key ................................................................................ 620
5.28.6 Managing Connections ................................................................................................. 620
5.28.6.1 Viewing a List of Connections ............................................................................ 621
5.28.6.2 Adding a Connection ......................................................................................... 621
5.28.6.3 Configuring Dead Peer Detection ....................................................................... 624
5.28.6.4 Deleting a Connection ....................................................................................... 625
5.28.7 Managing the Internet Key Exchange (IKE) Protocol ...................................................... 626
5.28.7.1 Viewing a List of IKE Algorithms ........................................................................ 626
5.28.7.2 Adding an IKE Algorithm ................................................................................... 626
5.28.7.3 Deleting an IKE Algorithm .................................................................................. 627
5.28.8 Managing the Encapsulated Security Payload (ESP) Protocol ......................................... 628
5.28.8.1 Configuring ESP Encryption ............................................................................... 628
5.28.8.2 Viewing a List of ESP Algorithms ....................................................................... 629
5.28.8.3 Adding ESP Algorithms ..................................................................................... 630
5.28.8.4 Deleting ESP Algorithms ................................................................................... 630
5.28.9 Configuring the Connection Ends .................................................................................. 631
5.28.10 Managing Private Subnets .......................................................................................... 634
5.28.10.1 Configuring Private Subnets for Connection Ends .............................................. 635
5.28.10.2 Viewing a List of Addresses for Private Subnets ................................................ 635
5.28.10.3 Adding an Address for a Private Subnet ........................................................... 636
5.28.10.4 Deleting an Address for a Private Subnet .......................................................... 637
5.29 Managing Layer 2 Tunnels ...................................................................................................... 637
5.29.1 Viewing the Round Trip Time Statistics ......................................................................... 638
5.29.2 Configuring L2TP Tunnels ............................................................................................ 638
5.29.3 Configuring L2TPv3 Tunnels ......................................................................................... 641
5.29.4 Configuring the Layer 2 Tunnel Daemon ....................................................................... 647
5.29.5 Managing GOOSE Tunnels .......................................................................................... 648
5.29.5.1 Viewing the GOOSE Tunnel Statistics ................................................................ 649
5.29.5.2 Viewing a List of GOOSE Tunnels ...................................................................... 649
5.29.5.3 Adding a GOOSE Tunnel .................................................................................. 649
5.29.5.4 Deleting a GOOSE Tunnel ................................................................................. 651

Table of Contents

Related product manuals