viii |
Table of Contents
Necessary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Setup on the "Road Warrior" machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Setup on the ACS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
The IPsec Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
NAT-Transversal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Adding and Removing a Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Starting and Stopping a Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
IPsec whack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Conn Sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Config Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
CLI Method - VPN Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
VI Method - Involved parameters and passed values . . . . . . . . . . . . . . . . . 153
CLI Method - SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Port Slave Parameters Involved with syslog-ng . . . . . . . . . . . . . . . . . . . . . . . . . 161
The Syslog Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Syslog-ng and its Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Some Examples of Defining Sources: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Some Examples of Defining Filters: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Some examples of defining actions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Examples connecting sources, filters and actions:. . . . . . . . . . . . . . . . . . . . 173
Syslog-ng configuration to use with Syslog buffering feature . . . . . . . . . . . . . . 174
Syslog-ng configuration to use with multiple remote Syslog servers. . . . . . . . . 175
VI Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
CLI Method - Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Summary of Contents for AlterPath ACS
Page 16: ...xvi Table of Contents...
Page 29: ...13 This page has been left intentionally blank...
Page 30: ...14 Preface...
Page 68: ...52 Device Access...
Page 86: ...70 Authentication Step 5 Saving changes To save the configuration run the command saveconf...
Page 96: ...80 Authentication Save the configuration to flash 2 cli config savetoflash...
Page 114: ...98 Authentication...
Page 204: ...188 Administration To exit the CLI mode and return to ACS s shell issue the command cli quit...
Page 268: ...252 Power Management with AlterPath PM Integration...
Page 304: ...288 PCMCIA Cards Integration...
Page 338: ...322 Profile Configuration...
Page 364: ...348 Additional Features and Applications...
Page 376: ...360 Appendix A New User Background Information...
Page 406: ...390 Appendix C Cabling and Hardware Information This page has been left intentionally blank...
Page 418: ...402 List of Tables...
Page 420: ...404 List of Figures...