
AG 5500
Introduction
17
Secure Management
There are many different ways to configure, manage and monitor the performance and up-time
of network devices. SNMP, Telnet, HTTP and ICMP are all common protocols to accomplish
network management objectives. And within those objectives is the requirement to provide the
highest level of security possible.
While several network protocols have evolved that offer some level of security and data
encryption, the preferred method for attaining maximum security across all network devices is
to establish an IPSec tunnel between the NOC (Network Operations Center) and the edge
device (early VPN protocols such as PPTP have been widely discredited as a secure tunneling
method).
As part of Nomadix’ commitment to provide outstanding carrier-class network management
capabilities to its family of public access gateways, we offer secure management through the
NSE’s standards-driven, peer-to-peer IPSec tunneling with strong data encryption.
Establishing the IPSec tunnel not only allows for the secure management of the Nomadix
gateway using any preferred management protocol, but also the secure management of third
party devices (for example, WLAN Access Points and 802.3 switches) on private subnets on
the subscriber side of the Nomadix gateway. See also,
“Enabling Secure Management {VPN
Tunnel}” on page 148
.
Two subsequent events drive the secure management function of the Nomadix gateway and the
devices behind it:
1.
Establishing an IPSec tunnel to a centralized IPSec termination server (for example,
Nortel Contivity). As part of the session establishment process, key tunnel parameters are
exchanged (for example, Hash Algorithm, Security Association Lifetimes, etc.).
2.
The exchange of management traffic, either originating at the NOC or from the edge
device through the IPSec tunnel. Alternatively, AAA data such as RADIUS
Authentication and Accounting traffic can be sent through the IPSec tunnel. See also,
“RADIUS-driven Auto Configuration” on page 15
.
The advantage of using IPSec is that all types of management traffic are supported, including
the following typical examples:
z
ICMP - PING from NOC to edge devices
z
Telnet - Telnet from NOC to edge devices
z
Web Management - HTTP access from NOC to edge devices
z
SNMP
z
SNMP GET from NOC to subscriber-side device (for example, AP)
z
SNMP SET from NOC to subscriber-side device (for example, AP)
z
SNMP Trap from subscriber-side device (for example, AP) to NOC
ag5500_userguide.book Page 17 Tuesday, June 5, 2007 7:31 PM
Summary of Contents for AG 5500
Page 1: ......
Page 6: ...This page intentionally left blank AG 5500 vi...
Page 40: ...This page intentionally left blank AG 5500 28 Introduction...
Page 46: ...AG 5500 34 Installing the AG 5500...
Page 68: ...This page intentionally left blank AG 5500 56 Installing the AG 5500...
Page 73: ...AG 5500 System Administration 61...
Page 106: ...AG 5500 94 System Administration IPSec Tunnel Security Policies...
Page 110: ...AG 5500 98 System Administration...
Page 115: ...AG 5500 System Administration 103...
Page 126: ...AG 5500 114 System Administration...
Page 174: ...AG 5500 162 System Administration...
Page 203: ...AG 5500 System Administration 191 The Internal Billing Options Setup screen appears...
Page 205: ...AG 5500 System Administration 193 Sample of Internal Billing Options XoverY Plan Setup Screen...
Page 210: ...AG 5500 198 System Administration...
Page 231: ...AG 5500 System Administration 219 4 Repeat Steps 1 3 for page 2 of 2 see following screen...
Page 234: ...AG 5500 222 System Administration 5 Repeat Steps 1 3 for page 3 of 3 see following screen...
Page 268: ...This page intentionally left blank AG 5500 256 The Subscriber Interface...
Page 299: ...AG 5500 Quick Reference Guide 287 Here is the output of cakey pem...
Page 301: ...AG 5500 Quick Reference Guide 289 Here is the output of server csr...
Page 316: ...This page intentionally left blank AG 5500 304 Troubleshooting...
Page 318: ...This page intentionally left blank AG 5500 306 Appendix A Technical Support...
Page 338: ...This page intentionally left blank AG 5500 326 Index...