Page 44 - Configuration Examples
Task Description
Step 6
For Branch No. 1, use the
parameters shown in Steps 3 and 4
to complete the IPSec form
configuration.
In order for an IPSec SA to be established between two
systems the IKE and IPSec Policies form must be
identical for each peer.
Step 7
Checking to see if the tunnel is up.
Using a protocol analyser check to see that the six
ISAKMP Main Mode messages appear.
Check to see that four Quick Mode messages appear.
This Signifies that the IPSec Tunnel is up.
When passing data through the tunnel you should see
ESP packets on the protocol analyser.
Use SysMonitor to view PPP packet exchanges. PPP
echo Request /Reply packets will be see (if selected)
when the L2TP tunnel is active. They will also be seen
when the active L2TP tunnel is protected by IPSec.
For VoIP configuration refer to Part 3 VoIP Configuration on page 53.
IPSec encrypts all L2TP data, including the L2TP tunnel setup packets. This is an
example of L2TP running inside IPSec.
Page 44 - Configuration Examples
IP Office (R3.0)
Part 2: VPN configuration
40DHB0002UKER Issue 3 (4th February 2005)