A
CCESS
G
ATEWAY
126
System Administration
3.
Check
Enable NAT Traversal
to allow packets to traverse NAT/IPsec boundaries.
4.
Click
Submit
to save the setting.
To add or modify IPsec tunnel peers, see
“Managing IPSec Tunnel Peers” on page 126
. To
add or modify IPsec security policies, see
“Managing IPSec Security Policies” on
page 127
.
Managing IPSec Tunnel Peers
You can add a new IPSec tunnel peer or modify the settings of an existing IPSec tunnel peer
from the
IPSec Tunnel Settings
screen.
Adding a new IPSec tunnel peer
1.
Click the
Add
button in the
IPSec Tunnel Peers
table. The
IPSec Tunnel Peer Settings
screen opens.
2.
Enter the IP address of the peer in the
Tunnel Peer
field.
3.
Enter a Dead Peer Detection interval (integer value in seconds).
4.
Select the Internet Key Exchange (IKE) Protocol Version.
5.
In the
Peer Authentication Method
section,
select one of the two peer authentication
methods:
Summary of Contents for Access Gateway
Page 1: ......
Page 12: ...ACCESS GATEWAY xii ...
Page 51: ...ACCESS GATEWAY Introduction 39 ...
Page 84: ...ACCESS GATEWAY 72 Installing the Access Gateway ...
Page 90: ...ACCESS GATEWAY 78 Installing the Access Gateway ...
Page 95: ...ACCESS GATEWAY System Administration 83 ...
Page 96: ...ACCESS GATEWAY 84 System Administration ...
Page 146: ...ACCESS GATEWAY 134 System Administration ...
Page 161: ...ACCESS GATEWAY System Administration 149 ...
Page 185: ...ACCESS GATEWAY System Administration 173 ...
Page 205: ...ACCESS GATEWAY System Administration 193 The Network Interfaces screen appears ...
Page 310: ...ACCESS GATEWAY 298 The Subscriber Interface ...
Page 376: ...This page intentionally left blank ACCESS GATEWAY 364 Troubleshooting ...
Page 378: ...This page intentionally left blank ACCESS GATEWAY 366 ...