
13 - 120WiNG 5 Access Point System Reference Guide
13.3.20 VPN
IPSec VPN provides a secure tunnel between two networked peer access points or controllers. Administrators can
define which packets are sent within the tunnel, and how they are protected. When a tunnelled peer sees a sensitive
packet, it creates a secure tunnel and sends the packet through the tunnel to its remote peer destination.
Tunnels are sets of
security associations
(SA) between two peers. SAs define the protocols and algorithms applied
to sensitive packets and specify the keying mechanisms used by tunnelled peers. SAs are unidirectional and exist in
both the inbound and outbound direction. SAs are established per the rules and conditions of defined security
protocols (AH or ESP).
Crypto maps combine the elements comprising IPSec SAs. Crypto maps also include
transform sets
. A transform set
is a combination of security protocols, algorithms and other settings applied to IPSec protected traffic. One crypto
map is utilized for each IPsec peer, however for remote VPN deployments one crypto map is used for all the remote
IPsec peers.
Internet Key Exchange
(IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE
enhances IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE
automatically negotiates IPSec SAs, and enables secure communications without time consuming manual
pre-configuration.
VPN statistics are partitioned into the following:
•
•
Lease Time
When a DHCP server allocates an address for a DHCP client, the client is
assigned a lease (which expires after a designated interval defined by the
administrator). The lease time is the time an IP address is reserved for
re-connection after its last use. Using very short leases, DHCP can
dynamically reconfigure networks in which there are more computers than
there are available IP addresses. This is useful, for example, in education and
customer environments where client users change frequently. Use longer
leases if there are fewer users.
Last Updated
Displays the time the server was last updated.
Clear All
Select the
Clear All
button to clear the screen of its current status and begin
a new data collection.
Refresh
Select the
Refresh
button to update the screen’s statistics counters to their
latest values.
Summary of Contents for WiNG 5
Page 1: ...Motorola Solutions WiNG 5 Access Point System Reference Guide ...
Page 2: ......
Page 10: ...viii WiNG 5 Access Point System Reference Guide ...
Page 16: ...1 4 WiNG 5 Access Point System Reference Guide ...
Page 28: ...2 12 WiNG 5 Access Point System Reference Guide ...
Page 48: ...3 20 WiNG 5 Access Point System Reference Guide ...
Page 197: ...Device Configuration 5 137 Figure 5 78 Profile Management Settings screen ...
Page 335: ...Device Configuration 5 275 Figure 5 155 Profile Overrides Management Settings screen ...
Page 348: ...5 288 WiNG 5 Access Point System Reference Guide ...
Page 350: ...6 2 WiNG 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 448: ...6 100 WiNG 5 Access Point System Reference Guide ...
Page 492: ...8 32 WiNG 5 Access Point System Reference Guide ...
Page 538: ...9 46 WiNG 5 Access Point System Reference Guide ...
Page 564: ...11 10 WiNG 5 Access Point System Reference Guide ...
Page 606: ...12 42 WiNG 5 Access Point System Reference Guide ...
Page 762: ...A 2 WiNG 5 Access Point System Reference Guide ...
Page 801: ......