Nortel Networks 608(WL) Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software Nortel Networks 608(WL) herunter. Nortel Networks 608(WL) User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 222
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - IPSec Configuration Guide

SpeedTouch™608WL and SpeedTouch™620 onlySpeedTouch™608(WL)/620(Wireless) Business DSL RouterIPSec Configuration GuidePowerEthernetWLANPlug-inISDNInter

Seite 2

ContentsE-DOC-CTC-20051017-0169 v0.18

Seite 3 - 608(WL)/620

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.198Integrity The SpeedTouch™ supports two types of hashing algorithms: HMAC is alway

Seite 4 - Status: v1.0 (January 2006)

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1993.5.11 Connection Options PageOptionspage layoutThe Options page allows you to def

Seite 5

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.11003.5.12 Client PageClientpage layoutThe Client page is used for dialling-in to a V

Seite 6

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11014 Configuration via the Command Line InterfaceIn this chapter This

Seite 7

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11024.1 Basic IPSec configuration procedureTerminology The SpeedTouch™

Seite 8

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1103Procedure In order to set up a basic IPSec configuration, the foll

Seite 9

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11044.2 Peer: Authentication AttributeWhat is ... Two main methods for

Seite 10 - Contents

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11054.2.1 Authentication Attribute ParametersParameter table The authe

Seite 11 - E-DOC-CTC-20051017-0169 v1.0

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11064.2.2 List all Authentication Attributeslist command The ipsec pee

Seite 12

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11074.2.3 Create a New Authentication Attributeadd command The ipsec p

Seite 13 - Chapter 1

About this IPSec Configuration GuideE-DOC-CTC-20051017-0169 v1.09About this IPSec Configuration GuideAbstract This document explains the IPSec functio

Seite 14 - 1.1 IPSec Concepts

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11084.2.4 Set or Modify the Authentication Attribute Parametersmodify

Seite 15

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11094.2.5 Delete an Authentication attributedelete command The IPSec p

Seite 16

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11104.3 Peer Security DescriptorWhat is ... All security parameters re

Seite 17 - Chapter 2

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11114.3.1 Peer Security Descriptor ParametersParameter table The follo

Seite 18 - 2.1 Policy

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1112Cryptographic function[crypto]The table below shows the encryption

Seite 19 - 2.2 Security Descriptor

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1113IKE SA lifetime[lifetime_secs]The lifetime of a Security Associati

Seite 20 - 2.3 Authentication Attribute

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11144.3.2 List all Peer Security Descriptorslist command The ipsec pee

Seite 21 - 2.4 Peer (Phase 1)

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11154.3.3 Create a New Peer Security Descriptoradd command A new Peer

Seite 22 - 2.5 Connection (Phase 2)

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11164.3.4 Set or Modify the Peer Descriptor Parametersmodify command T

Seite 23 - 2.6 Network descriptor

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11174.3.5 Delete a Peer Descriptordelete command The ipsec peer descri

Seite 24

About this IPSec Configuration GuideE-DOC-CTC-20051017-0169 v1.010

Seite 25

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11184.4 PeerWhat is ... The Peer is a term that refers to the remote S

Seite 26

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11194.4.1 Peer parametersParameters table The following table shows th

Seite 27

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1120Remote SecurityGateway identifier[remoteaddr]This parameter locali

Seite 28

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1121Remote Identifier[remoteid]This parameter identifies the remote Se

Seite 29

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1122Physical Interface [phyif] You can tie the peer to one of your Spe

Seite 30

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11234.4.2 List all peer entitieslist command The ipsec peer list comm

Seite 31

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11244.4.3 Create a new peer entityadd command A new Peer is created wi

Seite 32

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11254.4.4 Set or modify the peer parametersmodify command The ipsec pe

Seite 33

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11264.4.5 Delete a Peer entitydelete command The ipsec peer delete co

Seite 34

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11274.5 Connection Security DescriptorWhat is ... All security paramet

Seite 35

Chapter 1IPSec: Concept for secure IP connectionsE-DOC-CTC-20051017-0169 v1.0111 IPSec: Concept for secure IP connections Policies The introduction of

Seite 36

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11284.5.1 Connection Security Descriptor parametersParameters table Th

Seite 37

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1129Cryptographic function[crypto]The table below shows the cryptograp

Seite 38

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1130Perfect ForwardSecrecy [pfs]Enables or disables the use of Perfect

Seite 39

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11314.5.2 List all Connection Security Descriptorslist command The ips

Seite 40

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11324.5.3 Create a new Connection Security Descriptoradd command A new

Seite 41

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11334.5.4 Set the Connection Security Descriptor Parametersmodify comm

Seite 42

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11344.5.5 Delete a Connection Security Descriptordelete command The ip

Seite 43

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11354.6 Network DescriptorWhat is ... The concept of Network Descripto

Seite 44

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11364.6.1 Network Descriptor ParametersParameters table The following

Seite 45

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1137Protocol [proto] Access to an IPSec connection can be restricted t

Seite 46

Chapter 1IPSec: Concept for secure IP connectionsE-DOC-CTC-20051017-0169 v1.0121.1 IPSec ConceptsRed and Black Network Following nomenclature will be

Seite 47

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11384.6.2 Create a New Network Descriptoradd command A new Network Des

Seite 48

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11394.6.3 Set the Network Descriptor Parametersmodify command The ipse

Seite 49 - 3.1.3 Connections Page

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11404.6.4 Delete a Network Descriptordelete command The ipsec connecti

Seite 50

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11414.7 ConnectionWhat is ... A Connection bundles all the parameters

Seite 51

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11424.7.1 Connection ParametersParameters table The table below shows

Seite 52

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1143Local network[localnetwork]This parameter is used in the proposal

Seite 53 - 3.2 VPN Client

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1144Always-on connection[alwayson]This parameter determines whether th

Seite 54 - 3.2.1 VPN Client Page

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11454.7.2 List all Connectionslist command The ipsec connection list

Seite 55

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11464.7.3 Create a New Connectionadd command A new Connection is creat

Seite 56

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11474.7.4 Set or Modify the Connection Parametersmodify command The ip

Seite 57

Chapter 1IPSec: Concept for secure IP connectionsE-DOC-CTC-20051017-0169 v1.013Internet Key Exchange The Internet Key Exchange (IKE) protocol is the n

Seite 58

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11484.7.5 Delete a Connectiondelete command The ipsec connection delet

Seite 59

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11494.7.6 Start a Connectionstart command The ipsec connection start

Seite 60

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11504.7.7 Stop a connectionstop command The ipsec connection stop com

Seite 61

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11514.8 Auxiliary CommandsIn this section The following topics are dis

Seite 62

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11524.8.1 Config CommandWhat is it used for This command serves two di

Seite 63

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1153AutoProxyARP The automatic addition of ProxyARP entries in VPN cli

Seite 64 - 3.2.3 Closing a Connection

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1154An example of AutoProxyARPAs an example, suppose a VPN server is c

Seite 65 - 3.3 VPN Server

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11554.8.2 Flush CommandWhat is it used for This command flushes the co

Seite 66 - 3.3.1 VPN Server Page

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11564.8.3 Clear Command GroupWhat is it used for This command group co

Seite 67

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.11574.9 Organisation of the IPSec Command GroupIntroduction In this se

Seite 68

Chapter 1IPSec: Concept for secure IP connectionsE-DOC-CTC-20051017-0169 v1.014

Seite 69

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1158Connection commandgroupThe following table shows the commands of t

Seite 70

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1159Peer command group The following table shows the commands of the i

Seite 71

Chapter 4Configuration via the Command Line InterfaceE-DOC-CTC-20051017-0169 v0.1160Show command group The following table shows the commands of the i

Seite 72

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11615 Troubleshooting SpeedTouch™ IPSecIntroduction IPSec is a complex protocol s

Seite 73

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11625.1 Via the Debug Web pagesHow to see the statusof the VPN connectionBrowse t

Seite 74

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1163How to monitor theIPSec negotiationsProceed as follows:1 Browse to Expert mod

Seite 75 - 3.4 Certificates

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1164How to see the amountof traffic carried by aVPN connectionBrowse to Expert mo

Seite 76

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11655.2 Via the CLI: Show command groupShow command group  You can check whether

Seite 77 - 3.5 Advanced VPN Menu

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1166...IPSecGlobalStats----------------IPSecGlobalActiveTunnels : 0IPSecGlob

Seite 78

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11675.3 Via the CLI: Debug command group Traceconfig command The traceconfig comm

Seite 79

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0152 SpeedTouch™ IPSec terminologyIntroduction In order to understand the IPSec confi

Seite 80 - 3.5.1 Peer Profiles Page

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1168Via Syslog messages The Syslog protocol is a powerful mechanism to investigat

Seite 81

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1169Syslog messages The following table shows the syslog messages.Severity Conten

Seite 82

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11705.4 Via SNMPDebugging via SNMPOn the SpeedTouch™, several SNMP MIBs are avail

Seite 83

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.11715.5 Pinging from the SpeedTouch™ to the remote private networkPing command In

Seite 84 - 3.5.2 Authentication Page

Chapter 5Troubleshooting SpeedTouch™ IPSecE-DOC-CTC-20051017-0169 v0.1172

Seite 85 - 3.5.3 Peer Descriptors Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11736 Advanced FeaturesIn this section The following topics are described in this section:Topic P

Seite 86

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11746.1 IPSec and the Stateful Inspection FirewallWhat about ... The SpeedTouch™ has a built-in f

Seite 87 - 3.5.4 Peer Options Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11756.2 Surfing through the VPN tunnelWeb BrowsingInterception and surfingthrough a tunnelOne of

Seite 88 - 3.5.5 VPN-Client Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11766.3 Extended Authentication (XAuth)What is ... Extended Authentication, commonly referred to

Seite 89

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11776.4 VPN ClientIntroduction The SpeedTouch™ can be configured as a VPN client. SpeedTouch™. In

Seite 90 - 3.5.6 VPN-Server Page

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0162.1 PolicyWhat is ... Security is all about traffic policies and these can be conf

Seite 91

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11786.4.1 VPN Client parametersParameters table The following table shows the VPN Client paramete

Seite 92 - 3.5.7 VPN-Server-XAuth Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11796.4.2 Create a new vpnclientadd command A new vpnclient is created with the ipsec peer vpncli

Seite 93

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11806.4.3 Set or modify the vpnclient parametersmodify command The ipsec peer vpnclient modify c

Seite 94

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11816.4.4 Attach the vpnclient entity to the peer entitymodify the peerparametersThe :ipsec peer

Seite 95

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11826.5 VPN ServerIntroduction In the previous section the SpeedTouch™ was used as a VPN client.

Seite 96 - 3.5.9 Networks Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11836.5.1 VPN Server parametersParameters table The following table shows the VPN Server paramete

Seite 97

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1184Push IP address[push_ip]The VPN server will always provide an IP address to the remote VPN cl

Seite 98

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11856.5.2 Create a new VPN serveradd command A new VPN server is created with the ipsec peer vpns

Seite 99

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11866.5.3 Set or modify the vpnserver parametersmodify command The ipsec peer vpnserver modify c

Seite 100 - Chapter 3

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11876.5.4 Attach the vpnserver entity to the peer entitymodify the peerparametersThe :ipsec peer

Seite 101

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0172.2 Security DescriptorWhat is ... All security parameters required to establish a

Seite 102 - 3.5.12 Client Page

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11886.6 XAuth Users PoolIntroduction In the previous section the application of the SpeedTouch™ a

Seite 103 - SpeedTouch A SpeedTouch B

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11896.6.1 XAuth Pool parametersParameters table The following table shows the XAuth Pool paramete

Seite 104 - Chapter 4

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11906.6.2 Create a new XAuth pooladd command A new XAuth pool is created with the ipsec peer vpns

Seite 105

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11916.6.3 Modify the xauthpool typemodify command With the ipsec peer vpnserver xauthpool modify

Seite 106

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11926.6.4 Attach the xauthpool entity to the vpnserver entitymodify the vpnserverparametersThe :i

Seite 107

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11936.6.5 Delete an xauthpool entitydelete command The ipsec peer vpnserver xauthpool delete com

Seite 108

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11946.6.6 XAuth User parametersParameters table The following table shows the XAuth User paramete

Seite 109

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11956.6.7 Create a new XAuth useradduser command A new XAuth user is created with the ipsec peer

Seite 110 - Parameters

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11966.6.8 Set or modify the password of an XAuth usermoduser command The ipsec peer vpnserver xau

Seite 111

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11976.6.9 Delete an xauthuser entitydelete command The ipsec peer vpnserver xauthpool deluser co

Seite 113 - Hash function

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0182.3 Authentication AttributeWhat is ... Two main methods for authentication are su

Seite 114

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.11986.7 The Default Peer ConceptWhy the default peerconceptConsider the network configuration sho

Seite 115

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1199Example IPSecconnection, applying thedefault peer conceptSpeedTouch™ [1] IPSec peer configura

Seite 116

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12006.8 One Peer - Multiple ConnectionsMultiple tunnels In order to setup a Phase 2 tunnel, a Pha

Seite 117

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12016.9 Peer OptionsOptions list The peer options alter the behaviour of the VPN network. Options

Seite 118

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1202Dead Peer Detection The SpeedTouch™ supports the Dead Peer Detection protocol. By default, t

Seite 119

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12036.9.1 List all Peer Options listslist command The ipsec peer options list command shows all p

Seite 120 - 4.4 Peer

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12046.9.2 Create a Peer Options listadd command The ipsec peer options add command allows adding

Seite 121 - 4.4.1 Peer parameters

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12056.9.3 Set or modify the Peer Option list parametersmodify command The ipsec peer options mod

Seite 122

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12066.9.4 Delete a Peer Options listdelete command The ipsec peer options delete command deletes

Seite 123

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12076.10 Connection OptionsOptions list The connection options alter the behaviour of the VPN net

Seite 124

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0192.4 Peer (Phase 1)What is ... The Peer is a term that refers to the remote Securit

Seite 125 - 4.4.2 List all peer entities

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1208Don’t Fragment bit[force_df]IPSec encryption increases the packet length. When the MTU of a l

Seite 126

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12096.10.1 List all Connection Options listslist command The ipsec connection options list comma

Seite 127

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12106.10.2 Create a Connection Options listadd command The ipsec connection options add command

Seite 128 - 4.4.5 Delete a Peer entity

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12116.10.3 Set or modify the Connection Option list parametersmodify command The ipsec connectio

Seite 129

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12126.10.4 Delete an Options listdelete command The ipsec connection options delete command dele

Seite 130 - (key length)

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.12136.11 Advanced ConnectionIntroduction The Advanced command group is a sub-group of the Connect

Seite 131

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1214Local network[localnetwork]This parameter is used in the proposal presented to the remote Sec

Seite 132

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1215Local match[localmatch] This setting is relevant in responder mode only. It is optionally fil

Seite 133

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1216Remote match[remotematch] This setting is relevant in responder mode only. It is optionally f

Seite 134

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1217Local selector[localselector] The local selector expresses a static IPSec policy for access t

Seite 135

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0202.5 Connection (Phase 2)What is ... Bundles all the parameters required for the Ph

Seite 136

Chapter 6Advanced FeaturesE-DOC-CTC-20051017-0169 v0.1218

Seite 138

Need more help?Additional help is available online at www.speedtouch.com© THOMSON 2006. All rights reserved. E-DOC-CTC-20051017-0169 v1.0 .

Seite 139

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.0212.6 Network descriptorWhat is ... The concept of Network Descriptors is introduced

Seite 140

Chapter 2SpeedTouch™ IPSec terminologyE-DOC-CTC-20051017-0169 v1.022

Seite 141

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1233 Configuration via Local PagesPrerequisites In order to use the VPN features in t

Seite 142

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.124In this section The following topics are discussed in this section:Topic Page3.1 L

Seite 143 - 4.7 Connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1253.1 LAN to LAN ApplicationReference network A simple LAN-to-LAN network configurat

Seite 144 - 4.7.1 Connection Parameters

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.126Selecting the LAN toLAN applicationIn Expert Mode, click VPN > LAN to LAN. As a

Seite 145

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1273.1.1 Remote Gateway Address Known PageVPN context You know the location of the Re

Seite 146

SpeedTouch™608(WL)/620IPSec Configuration Guide

Seite 147 - 4.7.2 List all Connections

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.128Buttons You can use one of the following buttons:Remote Gateway The Remote Gateway

Seite 148 - 4.7.3 Create a New Connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.129Miscellaneous Comprises the following settings: Primary Untrusted Physical Interf

Seite 149

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.130IKE SecurityDescriptorsThe IKE Security Descriptor bundles the security parameters

Seite 150 - 4.7.5 Delete a Connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.131Page layout for pre-shared keyauthenticationWhen you click Use Preshared Key Authe

Seite 151 - 4.7.6 Start a Connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.132IKE Authentication withPreshared KeyWhen you select Use Preshared Key Authenticati

Seite 152 - 4.7.7 Stop a connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.133Example of a completedpageThe illustration below shows a completed page. The data

Seite 153 - 4.8 Auxiliary Commands

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.134Buttons You can use one of the following buttons:Click ... To ...Stop All Connecti

Seite 154 - 4.8.1 Config Command

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1353.1.2 Remote Gateway Address Unknown PageVPN context Your SpeedTouch™ may have to

Seite 155

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.136Aggressive Modeversus Main ModeIKE specifies two modes of operation for the Phase

Seite 156

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.137Miscellaneous Comprises the following settings: Primary Untrusted Physical Interf

Seite 157 - 4.8.2 Flush Command

CopyrightCopyright ©1999-2006 THOMSON. All rights reserved. Distribution and copying of this document, use and communication of its contents is not pe

Seite 158 - 4.8.3 Clear Command Group

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.138IKE SecurityDescriptorsThe IKE Security Descriptor bundles the security parameters

Seite 159

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.139Page layout for pre-shared keyauthenticationWhen you click Use Preshared Key Authe

Seite 160

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.140IKE Authentication withPreshared KeyWhen you select Use Preshared Key Authenticati

Seite 161

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.141Main Mode initial page When you click Main Mode, the following page is displayed:B

Seite 162

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.142Page layout withadditional DescriptorsWhen you click Specify Additional Descriptor

Seite 163 - Chapter 5

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.143Page layout forcertificateauthenticationWhen you click Use Certificate Authenticat

Seite 164 - 5.1 Via the Debug Web pages

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.144Identification &InterfaceThe Identification & Interface fields have to be

Seite 165

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.145Example of a completedpageThe illustration below shows a completed page. The data

Seite 166

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.146Buttons You can use one of the following buttons:Click ... To ...Stop All Connecti

Seite 167

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1473.1.3 Connections PagePage layout When you click New Connection to this Gateway, t

Seite 168

ContentsE-DOC-CTC-20051017-0169 v0.13ContentsAbout this IPSec Configuration Guide ... 91 IPSec: Concept for secure IP connections

Seite 169

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.148Trusted Network The Local and Remote Trusted Network parameters describe which ter

Seite 170

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.149Port If the tcp or udp protocol is selected for the protocol parameter, then the a

Seite 171

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.150Starting and stopping aconnection.A VPN connection is started automatically when d

Seite 172 - 5.4 Via SNMP

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1513.2 VPN ClientVPN context For a VPN client-server scenario a dedicated set of user

Seite 173

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1523.2.1 VPN Client PageInitial page When you click VPN > VPN Client, the followin

Seite 174

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.153Server IP Address orFQDNFill out the publicly known network location of the remote

Seite 175 - 6 Advanced Features

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.154IPSec SecurityDescriptorThe IPSec Security Descriptor bundles the security paramet

Seite 176 - Chapter 6

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.155Primary UntrustedPhysical InterfaceThis field shows a list of your SpeedTouch™ int

Seite 177

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.156Page layout for pre-shared keyauthenticationWhen you click Use Preshared Key Authe

Seite 178

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.157Starting and stopping aVPN client connectionTwo start mechanisms are defined:  Ma

Seite 179 - 6.4 VPN Client

ContentsE-DOC-CTC-20051017-0169 v0.143.3 VPN Server... 633.3.1 VPN Ser

Seite 180 - 6.4.1 VPN Client parameters

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.158Local LAN IP Range In this field you have to configure the local access policy. In

Seite 181 - 6.4.2 Create a new vpnclient

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1593.2.2 Starting the VPN Client ConnectionMethod 1:Automatic StartIn section “ Start

Seite 182

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.160Dialling in 1 Select the VPN server from the table and click Dial-In at the bottom

Seite 183

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.161Client Identification When for the IKE Authentication method the Preshared Key met

Seite 184 - 6.5 VPN Server

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1623.2.3 Closing a ConnectionDisconnect procedure At the bottom of the VPN Client Con

Seite 185 - 6.5.1 VPN Server parameters

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1633.3 VPN ServerVPN context In a VPN client-server scenario, the VPN server is alway

Seite 186

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1643.3.1 VPN Server PageInitial page When you click VPN > VPN Server, the followin

Seite 187 - 6.5.2 Create a new VPN server

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.165Buttons You can use one of the following buttons:Local Trusted Network The Local T

Seite 188

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.166Page layout withadditional NetworksClicking Specify Additional Networks allows you

Seite 189

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.167Page layout withadditional DescriptorsWhen you click Specify Additional Descriptor

Seite 190 - 6.6 XAuth Users Pool

ContentsE-DOC-CTC-20051017-0169 v0.154.4 Peer ... 1184.4.1 Pe

Seite 191 - 6.6.1 XAuth Pool parameters

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.168Miscellaneous Comprises the following settings: IKE Exchange Mode:IKE specifies t

Seite 192 - 6.6.2 Create a new XAuth pool

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.169VPN Server settings Comprises the following settings: Virtual IP Range:Specifies

Seite 193

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.170Page layout for pre-shared keyauthenticationWhen you click Use Preshared Key Authe

Seite 194

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.171 Remote ID (Filter) Type and Remote ID Filter:The Remote ID Filter identifies the

Seite 195

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.172Authorized Users List When you selected the use of XAuth (either generic or chap)

Seite 196 - 6.6.6 XAuth User parameters

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1733.4 CertificatesIntroduction The Certificates Navigation tab gives access to four

Seite 197 - 6.6.7 Create a new XAuth user

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.174CEP page This page allows configuring the Certificates Enrollment Protocol setting

Seite 198

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1753.5 Advanced VPN Menu When to use The Advanced VPN menu gives access to two main p

Seite 199

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.176Peer Profiles page When you click VPN > Advanced > Peers, the Peer Profiles

Seite 200 - 6.7 The Default Peer Concept

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.177Connection ProfilespageWhen you click VPN > Advanced > Connections, the Conn

Seite 201

ContentsE-DOC-CTC-20051017-0169 v0.165.3 Via the CLI: Debug command group ... 1675.4 Via SNMP ...

Seite 202 - Phase 2 tunnel (conn2)

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1783.5.1 Peer Profiles PagePeer Profilespage layoutThe Peer Profiles page bundles all

Seite 203 - 6.9 Peer Options

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.179Local ID The Local ID identifies the local SpeedTouch™ during the Phase 1 negotiat

Seite 204

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.180Primary UntrustedPhysical InterfaceThis field shows a list of your SpeedTouch™ int

Seite 205

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.181Peer Options This optional parameter refers to the symbolic name of a peer options

Seite 206

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1823.5.2 Authentication PageAuthenticationpage layoutThe Authentication page allows y

Seite 207

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1833.5.3 Peer Descriptors PageDescriptorspage layoutA Peer Security Descriptor contai

Seite 208

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.184Crypto The table below shows the encryption algorithms supported by the SpeedTouch

Seite 209 - 6.10 Connection Options

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1853.5.4 Peer Options PageOptionspage layoutThe Options page allows you to define Opt

Seite 210

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1863.5.5 VPN-Client PageVPN-Clientpage layoutThe VPN-Client page allows you to define

Seite 211

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.187Type The Type parameter determines which Virtual IP Address Mapping type is select

Seite 212

ContentsE-DOC-CTC-20051017-0169 v0.176.9 Peer Options ... 2016.9.1 List all

Seite 213

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1883.5.6 VPN-Server PageVPN-Serverpage layoutThe VPN-Server page allows you to define

Seite 214 - 6.10.4 Delete an Options list

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.189Secondary DNS The IP address of the secondary DNS server, provided to the VPN clie

Seite 215 - 6.11 Advanced Connection

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1903.5.7 VPN-Server-XAuth PageVPN-Server-XAuthpage layoutThe VPN-Server-XAuth page al

Seite 216

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1913.5.8 Connection Profiles PageConnection Profilespage layoutThe Connection Profile

Seite 217

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.192Local network This parameter is used in the proposal presented to the remote Secur

Seite 218

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.193Connection Options This optional parameter refers to the symbolic name of a connec

Seite 219

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1943.5.9 Networks PageNetworkspage layoutThe Networks page allows you to define Netwo

Seite 220

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.195Protocol Optionally, the access to an IPSec connection can be restricted to a spec

Seite 221

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.1963.5.10 Connection Descriptors PageDescriptorspage layoutA Connection Security Desc

Seite 222 - Need more help?

Chapter 3Configuration via Local PagesE-DOC-CTC-20051017-0169 v0.197Parameter table The following table summarizes the parameters comprised in the con

Kommentare zu diesen Handbüchern

Keine Kommentare