
48
645M 4G/LTE CELLULAR ROUTER
MN032003EN March 2017 www.eaton.com
5 IPsec and VPN pass-through
deployment guide
This chapter will help anyone who wants to build a secure
IP network using IPsec and the Eaton 645M Cellular Modem.
Case #1: 645M Configured IPsec Client will demonstrate
the 645M when used as an IPsec client. Case #2 645M
Configured to use a DMZ for VPN pass-through will show
the 645M passing an IPsec connection from WAN to LAN.
(VPN Pass-through).
5.1 Benefits of IPsec
IPsec (Internet Protocol Security Standard) is an industry driven
standard that ensures confidentiality, integrity, and authenticity
of an IP network. IPsec is a key component of this standard-
based, flexible solution for deploying a network-wide policy.
There are two significant benefits to IPsec compliance for our
customers: enhanced security features and interoperability.
•
Enhanced security features
provide the most secure and
comprehensive standard available today for encryption and
authentication.
The 645M IPsec encryption support: AES-128, AES-256
and 3DES.
The 645M IPsec authentication support: MD5 and SHA1.
All tunnels are created using the ESP (Encapsulating Security
Payload) protocol.
•
Protocol interoperability
means that an IPsec compliant
device, such as the 645M, will be able to exchange keys and
encrypted communications with another IPsec compliant
product such as a CISCO router. IPSEC compliance ensures
that these two different products can negotiate and maintain
a secure communication with each other.
5.2 Configuration summary
The first case demonstrates configuring IPsec tunnels on the
645M . The second example demonstrates configuring the
645M to use a DMZ for VPN pass-through between IPsec
clients and a remote host over a router acting as a VPN server.
Detailed configuration examples are provided for each scenario.
5.2.1 Case #1: 645M configured IPsec client
Overview
IPsec is a security protocol that provides secured
communication tunnels over IP. As you create IPsec tunnels
through the ELPRO 645M Web interface in the Security » IPsec
tab, they will be displayed in the Tunnel Table at the bottom of
the IPsec tab. All tunnels are created using the
ESP (Encapsulating Security Payload) Protocol.
The following figure depicts an IPsec tunnel between a
Remote Telemetry Unit (RTU) and Application Server.
Figure 50 . 645M configured as an IPsec client
5 IPsec and VPN pass-through deployment guide