Page 38 - Configuration Examples
Task Description
Step 1
In order to establish IP connectivity,
configure the two systems using the
IP addressing details above.
See the Basic Internet access section - Internet
Access using a Logical Interface on page 34.
Step 2
Check for IP Connectivity
Before beginning the configuration of the IPSec
element of this example it must be possible to perform
the following tasks.
•
IP Office A: Ping the local ADSL router
•
IP Office A: Ping the remote ADSL router
•
IP Office A: Ping the remote IP Office B [1]
•
IP Office A: Browse the Internet
•
IP Office B: Browse the Internet
•
IP Office B: Ping the local ADSL router
•
IP Office B: Ping the remote ADSL router
•
IP Office B: Ping the remote IP Office A [1]
[1] Assumes that the Firewall Profile is not active
on the receiving interface.
Do not proceed until all of these tests are successful.
It should
not
be possible to ping between the Internal
LANs at this stage.
Step 3
Install the IPSec licence.
An IPSec licence is required for each IP Office system
in an SA. Make sure the IPSec licences are valid on
both systems.
Licence name – IPSec Tunneling.
Step 4
For IP Office A create an IPSec
tunnel.
Main tab
•
Name = IPSec_Tunnel
•
Local IP Address = 192.168.43.0
•
Local IP Mask = 255.255.255.0
•
Gateway - <LocalInterface>
•
Remote IP Address =
192.168.50.0
•
Remote IP Mask = 255.255.255.0
•
Gateway = 217.37.69.116
A unique name for the IPSec tunnel is required.
The Local IP Address/Mask is the range of IP
addresses you want to secure through the tunnel.
The Remote IP Address is the remote networks IP
address range to be secured through the tunnel.
The Gateway is the IPSec tunnel endpoint address.
Step 5
For IP Office A perform the
following.
IKE Polices tab
•
Shared Secret = password
•
Exchange Type = ID port
•
Encryption = DES
•
Authentication = MD5
•
DH Group = Group 2
•
Life Type = Seconds
•
Life = 86400
Both tunnel endpoints must have the same-shared
secret.
Encryption set to DES.
Authentication set to MD5
Diffie-Hellman Group = Group 2
This is the time period before a new key is generated
(86400 represents one day in seconds).
Page 38 - Configuration Examples
IP Office (R3.0)
Part 2: VPN configuration
40DHB0002UKER Issue 3 (4th February 2005)