5 - 54 WiNG 5.4.2 Access Point System Reference Guide
11. Refer to the
Peer
table to review the configurations of the peers available for tunnel connection.
Select
+ Add Row
to populate the table with a maximum of two peer configurations.
Use Tunnel Policy
Select the L2TPv3 tunnel policy. The policy consists of user defined values for protocol
specific parameters which can be used with different tunnels. If none is available a new
policy can be created or an existing one can be modified. For more information, refer to
L2TP V3 Configuration on page 7-8
.
Local Hostname
Provide the tunnel specific hostname used by this tunnel. This is the host name advertised
in tunnel establishment messages.
Local Router ID
Specify the router ID sent in tunnel establishment messages with a potential peer device.
Establishment Criteria
Configure the establishment criteria for creating a tunnel between the device and the
NOC. This criteria is used to ensure that only one tunnel is created between two sites
where the tunnel is being established between the vrrp-master/cluster master/rf-domain
manager at the remote site and the controller at the NOC. The tunnel is created based on
the role of the remote peer.
•
always –
The tunnel is always created irrespective of the role of the local device.
•
vrrp-master
– The tunnel is only created when the local device is a VRRP master.
•
cluster-master
– The tunnel is only created when the local device is a cluster master.
•
rf-domain-manager
– The tunnel is only created when the local device is a RF-Domain
manager.
In all the above cases, if the local device goes offline for any reason, the tunnel is torn
down.
VRRP Group
This field is enabled only when the
Establishment Criteria
is set to
vrrp-master
. Use the
spinner to select the VRRP group.
Critical Resource
Enter the critical resources required for creating and maintaining a L2TPV3 tunnel. A
tunnel is only established when all critical resources for the tunnel to be operational are
available at the time when the tunnel is created. If any one of the listed critical resources
goes down, the tunnel is disabled.
When a tunnel is established, the listed critical resources are checked for availability.
Tunnel establishment is started if the critical resources are available. Similarly, for
incoming tunnel termination requests, listed critical resources are checked and tunnel
terminations are only allowed when the critical resources are available.
For more information on managing critical resources, see
Profile Critical Resources on
page 5-119
.
Summary of Contents for WiNG 5.4.2
Page 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Page 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Page 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Page 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Page 835: ......