background image

12

VSR-30™ Installation Guide

E.4 Virtual Private Network Connections 

One of the principal features in the BANDIT family of products is the support of virtual 
private networks (VPNs). This section discusses the configuration of VPNs in the BANDIT 
products. 

If any VPN connections will traverse satellite networks, the BANDIT uses Selective Layer 
Encryption™ (SLE, patent pending). See 

Section E.4.3, Selective Layer Encryption in VPNs

. The 

VSR products are dedicated to providing SLE VPN connections over satellite networks. 

1

To configure VPN connections, do the following: 

a

On the Advanced Configurations menu, select Routing. 

b

On the Routing menu, select IP Routing

c

On the IP Routing Configuration menu, select IP/VPN Routing

The Virtual Private Network Configuration menu appears. 

2

On the Virtual Private Network Configuration menu, do each of the following: 

a

To see the BANDIT device’s list of VPN connections and associated security protocols, 
select VPN Profiles

The VPN Profile Table appears. Go to 

Section E.4.1, Configuring VPN Profiles

b

To see the device’s list of security policies for VPN connections, select IP/VPN Policy 
Table

The IP Policy menu appears. Go to 

Section E.4.2, Configuring the IP/VPN Policy Table

Note:  

You must also configure an IP routing table for use by the virtual private network. 

See 

Section E.5.1, IP Routing

E.4.1 Configuring VPN Profiles 

To configure VPN profiles, do the following:

1

On the Virtual Private Network Configuration menu, select VPN Profiles. (See 

Section E.4, Virtual Private Network Connections

.) 

The VPN Profile Table appears. Each VPN profile lists the following: 

• The record number (line number) 

• The VPN connection’s profile name 

• The tunneling mode the profile uses 

• The IP address of the remote VPN gateway (the gateway at the other end of the VPN 

connection) 

• The first negotiation scheme this local BANDIT device proposes for the connection 

Note:  

For autokeyed connections, the table shows the authentication mode, 

authentication group, encryption protocol, and authentication protocol for Proposal 1 
in Phase 1. 

Summary of Contents for VSR-30

Page 1: ...ens shown in this document are examples the choices shown on your VSR 30 s menus depend on the features in the chassis and on the software version installed in the device For figures tables and config...

Page 2: ...power supply to a power outlet Figure 1 VSR 30 Chassis Front 2 Place the VSR 30 chassis on a tabletop or shelf 3 Connect an earth ground wire to the chassis as follows Attach a minimum 12 AWG wire to...

Page 3: ...e carrier network And if you wish to change the default settings for wireless access you need to reconfigure the wireless port In addition a GSM wireless card must hold the appropriate Subscriber Iden...

Page 4: ...ce s Configuration 1 On the Main Menu do one of the following a To set up a basic configuration of the VSR for your network select QuickStart Config Builders The Startup Config Options menu is display...

Page 5: ...ment Protocol E 1 Startup Configuration The menu provides several templates for configurations that your network may use You can select a template also known as a startup scenario change the scenario...

Page 6: ...that information When the item has been configured the scenario s menu is displayed again VSR 30 Startup Configuration Scenarios 1 Ethernet WAN SLE Gateway Initiator 2 Ethernet WAN SLE Gateway Initia...

Page 7: ...rn to Step 4 6 To load the new configuration enter y The configuration is loaded into the VSR Note When you write save a configuration entered on the Quickstart menu other required settings are update...

Page 8: ...ftware for the device s ports do the following 1 On the Advanced Configurations menu select Data Configuration The Logical Port Protocol menu is displayed Table 2 lists the Line IDs for the ports BAND...

Page 9: ...al Logical Port menu select the port to configure The Logical Port Attribute menu appears Logical Port Attribute Menu 1 Protocol Frame Relay 2 Global Paths 3 Undefine Current Logical Port Enter Choice...

Page 10: ...s port to use Go to Step 3a 3 To modify parameters in the port s protocol select Protocol The protocols available for the port are displayed a On the protocol configuration menu select and change para...

Page 11: ...ort s Logical Port Attribute menu 5 When you have finished configuring the port press Escape until you return to the Main Menu 6 Save the configuration and reset the device See Section F Saving Writin...

Page 12: ...security protocols select VPN Profiles The VPN Profile Table appears Go to Section E 4 1 Configuring VPN Profiles b To see the device s list of security policies for VPN connections select IP VPN Poli...

Page 13: ...d under the heading label No The fields for the selected VPN profile are displayed Note Although all VPN profile records have all fields the screen displays only the fields used in the keying specifie...

Page 14: ...ne of the following To save the changes press y To discard the changes and keep the prior information press n Whether you answer y or n the VPN Profile Table is redisplayed Return to Step 2 4 To add a...

Page 15: ...figure phase proposals for automatic keying do the following 1 On the VPN Profile Table type m to modify a line Then type the line number and press Enter See Section E 4 1 Configuring VPN Profiles The...

Page 16: ...nnection uses If your connections will include VPNs across satellite networks the BANDIT device will use selective layer encryption Before configuring the IP VPN Policy Table read Section E 4 3 Select...

Page 17: ...ollowing Type the line number of the entry you wish to modify The entry s list of values appears Select the field you wish to change The possible values for the field are listed Select the new value f...

Page 18: ...ered you are asked for a description c Type a name for the connection policy The entry is accepted A prompt appears for another new entry Repeat Step 6 7 To insert an entry do the following A prompt a...

Page 19: ...shows a sample satellite network combining PEP and SLE Figure 3 Sample Satellite Network Configuration Using Encore Networks SLE VPN E 4 3 1 SLE Configuration The BANDIT products can use the following...

Page 20: ...owever you need to supply the appropriate IP addresses Note In BANDIT software release 5 0 and above the user does not configure FTP HTTP ports 20 21 and 80 for SLE In addition Network Address Transla...

Page 21: ...otocol Flags Path Name Incoming Outgoing Filtering Action Allow VPN Profile name N A Description H 3 2 Source Address Low 172 16 10 128 Source Address High 172 16 10 255 So Address Low 10 10 11 1 Dest...

Page 22: ...to use the VSR 1 On the Advanced Configurations menu select Routing 2 On the Routing menu select IP Routing The IP Routing Configuration menu appears 3 See the following Section E 5 1 IP Routing Sect...

Page 23: ...Quality of Service Do the following 1 On the IP Routing Configuration menu select IP Quality of Service 2 On the IP Priority menu select Prioritization 3 On the IP Quality of Service menu do the follo...

Page 24: ...gs for the VSR do not use the firewall feature If you wish to configure the firewall do the following 1 On the Main Menu select Typical Configurations 2 On the Typical Configurations menu select Confi...

Page 25: ...Note If the device s software detects an error in the configuration it will not save it Review the configuration After you have revised the configuration to your satisfaction save it 3 Press Enter G...

Page 26: ...Device s Configuration To exit the session do the following 1 On the Main Menu select Exit Session The following prompt is displayed 2 Select Yes Note If the configuration has not been saved the devic...

Reviews: