75
Nortel VPN Router Configuration — Basic Features
Chapter 4
Configuring user tunnels
The Nortel VPN Router uses the Internet and tunneling protocols to create secure
connections. The following sections describe configuring the tunnel portion of the
Nortel VPN Router. The configuration process includes setting up the
authentication table and specific tunnel parameters, such as IPsec encryption,
L2TP access concentrators, and L2F network access servers.
Figure 9
shows a
typical network illustration with the Nortel VPN Router connected to the PDN
(public data network) and to a remote user through a tunnel.
Figure 9
Tunnel connection configuration
The connection attributes that you configure in the Nortel VPN Router enable the
remote user to create a tunnel into the Nortel VPN Router. However, you are not
configuring the connection from the remote user to the Internet Service Provider
(ISP) at this point. The actual connection to the Nortel VPN Router is a tunnel that
is started from the remote user's PC through its dial-up connection. That
connection is to the Internet (typically using an ISP), through the Internet, and
ends at the Nortel VPN Router on the private, corporate network.
Public WAN
Remote User Tunnel
to Switch
LAN
Firewall
Router
PDN
Private LAN
Nortel VPN Router
Summary of Contents for Contivity 1050
Page 10: ...10 Contents NN46110 500 ...
Page 14: ...14 Tables NN46110 500 ...
Page 22: ...22 Preface NN46110 500 ...
Page 58: ...58 Chapter 2 Getting started NN46110 500 ...
Page 74: ...74 Chapter 3 Setting up the Nortel VPN Router 1010 1050 and 1100 NN46110 500 ...
Page 90: ...90 Chapter 4 Configuring user tunnels NN46110 500 ...
Page 118: ...118 Chapter 5 Configuring the system NN46110 500 ...
Page 162: ...162 Chapter 8 Configuring IPSec mobility and persistent mode NN46110 500 ...
Page 164: ...164 Branch office quick start template NN46110 500 ...
Page 178: ...178 Index NN46110 500 W Web browser interface 50 Web interface options 53 Welcome display 56 ...