784
IPSec
N0008589 3.3
IPSec Remote User configuration
The IPSec Remote User feature allows remote users to dial in to an Internet Service Provider (ISP)
anywhere in the world and connect to the corporate network in a secure way. All the remote user
requires is an IPSec VPN client installed on their computer. This removes the need for the
traditional corporate remote access environments where banks of modems were employed to
handle incoming service requests.
The IPSec VPN client you require for Business Communications Manager is version 4.60 of the
Contivity VPN IPsec remote access user client software. To obtain a copy of this client software,
contact your authorized Business Communications Manager distributor. The Contivity VPN IPsec
remote access user client software is a Windows application available for the latest releases of
Windows 95, Windows 98, Windows NT Workstation, Windows NT Server, Windows 2000 and
Windows XP. This client software comes with complete online Help.
IPSec Remote User Authentication
Business Communications Manager only supports User Name and Password authentication from
the VPN Client. The authentication method used is local NT Authentication. No other form of
Authentication is supported. Business Communications Manager does not support Contivity
Group ID authentication.
Split Tunneling
All client traffic is tunneled through the Business Communications Manager by default. Split
Tunneling allows you to configure specific network routes that are downloaded to the client. Only
these network routes are then tunneled. Any other traffic goes to the local computer interface. Split
tunneling allows you to print locally, for example, even while you are tunneled into the Business
Communications Manager.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...