12
VSR-30™ Installation Guide
E.4 Virtual Private Network Connections
One of the principal features in the BANDIT family of products is the support of virtual
private networks (VPNs). This section discusses the configuration of VPNs in the BANDIT
products.
If any VPN connections will traverse satellite networks, the BANDIT uses Selective Layer
Encryption™ (SLE, patent pending). See
Section E.4.3, Selective Layer Encryption in VPNs
. The
VSR products are dedicated to providing SLE VPN connections over satellite networks.
1
To configure VPN connections, do the following:
a
On the Advanced Configurations menu, select Routing.
b
On the Routing menu, select IP Routing.
c
On the IP Routing Configuration menu, select IP/VPN Routing.
❖
The Virtual Private Network Configuration menu appears.
2
On the Virtual Private Network Configuration menu, do each of the following:
a
To see the BANDIT device’s list of VPN connections and associated security protocols,
select VPN Profiles.
❖
The VPN Profile Table appears. Go to
Section E.4.1, Configuring VPN Profiles
.
b
To see the device’s list of security policies for VPN connections, select IP/VPN Policy
Table
.
❖
The IP Policy menu appears. Go to
Section E.4.2, Configuring the IP/VPN Policy Table
.
Note:
You must also configure an IP routing table for use by the virtual private network.
See
Section E.5.1, IP Routing
.
E.4.1 Configuring VPN Profiles
To configure VPN profiles, do the following:
1
On the Virtual Private Network Configuration menu, select VPN Profiles. (See
Section E.4, Virtual Private Network Connections
.)
❖
The VPN Profile Table appears. Each VPN profile lists the following:
• The record number (line number)
• The VPN connection’s profile name
• The tunneling mode the profile uses
• The IP address of the remote VPN gateway (the gateway at the other end of the VPN
connection)
• The first negotiation scheme this local BANDIT device proposes for the connection
Note:
For autokeyed connections, the table shows the authentication mode,
authentication group, encryption protocol, and authentication protocol for Proposal 1
in Phase 1.