
AG 5000
24
Introduction
As part of Nomadix’ commitment to provide outstanding carrier-class network
management capabilities to its family of public access gateways, we offer secure
management through the NSE’s standards-driven, peer-to-peer IPSec tunneling with
strong data encryption. Establishing the IPSec tunnel not only allows for the secure
management of the Nomadix gateway using any preferred management protocol, but
also the secure management of third party devices (for example, WLAN Access
Points and 802.3 switches) on private subnets on the subscriber side of the Nomadix
gateway. See also,
“Enabling Secure Management {VPN Tunnel}” on page 117
.
Two subsequent events drive the secure management function of the Nomadix
gateway and the devices behind it:
1.
Establishing an IPSec tunnel to a centralized IPSec termination server (for
example, Nortel Contivity). As part of the session establishment process, key
tunnel parameters are exchanged (for example, Hash Algorithm, Security
Association Lifetimes, etc.).
2.
The exchange of management traffic, either originating at the NOC or from
the edge device through the IPSec tunnel. Alternatively, AAA data such as
RADIUS Authentication and Accounting traffic can be sent through the
IPSec tunnel. See also,
“RADIUS-driven Auto Configuration” on page 22
.
The advantage of using IPSec is that all types of management traffic are supported,
including the following typical examples:
ICMP - PING from NOC to edge devices
Telnet - Telnet from NOC to edge devices
Web Management - HTTP access from NOC to edge devices
SNMP
SNMP GET from NOC to subscriber-side device (for example, AP)
SNMP SET from NOC to subscriber-side device (for example, AP)
SNMP Trap from subscriber-side device (for example, AP) to NOC
Secure Socket Layer (SSL)
This feature allows for the creation of an end-to-end encrypted link between your
NSE-powered product and wireless clients by enabling the Internal Web Server
(IWS) to display pages under a secure link—important when transmitting AAA
information in a wireless network when using RADIUS.
SSL requires service providers to obtain digital certificates from VeriSign™ to create
HTTPS pages. Instructions for obtaining certificates are provided by Nomadix.
ag5000_userguide.book Page 24 Friday, March 4, 2005 3:05 PM
Summary of Contents for AG 5000
Page 1: ...Nomadix AG 5000 User s Guide...
Page 6: ...This page intentionally blank...
Page 158: ...AG 5000 154 System Administration Sample of Internal Billing Options XoverY Plan Setup Screen...
Page 185: ...AG 5000 System Administration 181 5 Repeat Steps 1 3 for page 3 of 3 see following screen...
Page 206: ...AG 5000 202 System Administration Notes Use this page for your notes...
Page 262: ...AG 5000 258 Troubleshooting Notes Use this page for your notes...
Page 264: ...AG 5000 260 Technical Support Notes Use this page for your notes...
Page 280: ...AG 5000 276 Glossary of Terms Notes Use this page for your notes...
Page 286: ...AG 5000 282 Index This page intentionally blank...