![background image](http://html1.mh-extra.com/html/patton-electronics/iplink-2821/iplink-2821_getting-started-manual_4067682007.webp)
7
IPLink 2800 Series Getting Started Guide
Table of Contents
Configuring Channel-Group Timeslots
Configuring Channel-Group Encapsulation
Entering HDLC Configuration Mode
Configuring HDLC Encapsulation
Example 1: Frame Relay without a channel-group
.....................................................................................67
Example 2: Framerelay with a channel-group
............................................................................................68
Example 3: PPP without a channel-group
.................................................................................................68
Example 4: PPP with a channel-group
.......................................................................................................68
6
........................................................................................................................................ 69
..........................................................................................................................................................70
................................................................................................................................................70
......................................................................................................................................................70
...................................................................................................................................71
Creating an IPsec transformation profile
Creating an IPsec policy profile
.......................................................................................................................72
Creating/modifying an outgoing ACL profile for IPsec
...................................................................................74
Configuration of an IP interface and the IP router for IPsec
............................................................................75
Displaying IPsec configuration information
....................................................................................................75
.............................................................................................................................................76
...........................................................................................................................................77
.........................................................................................................................77
.................................................................................................................................77
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
.................................................................................................................................78
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
..................79
.................................................................................................................................79
7
Access control list configuration
.................................................................................................................... 81
..........................................................................................................................................................82
.......................................................................................................................................82
.........................................................................................................................................82
Why you should configure access lists
.............................................................................................................82
When to configure access lists
.........................................................................................................................83
Features of access control lists
Access control list configuration task list
................................................................................................................84
Mapping out the goals of the access control list
...............................................................................................84
Creating an access control list profile and enter configuration mode
...............................................................85
Adding a filter rule to the current access control list profile
.............................................................................85
Summary of Contents for IPLink 2821
Page 4: ...Summary Table of Contents IPLink 2800 Series Getting Started Guide 4...
Page 18: ...About this guide IPLink 2800 Series Getting Started Guide 18...
Page 114: ...114 Chapter 9 LEDs status and monitoring Chapter contents Status LEDs 121...
Page 134: ...134 Appendix E IPLink 2800 Series factory configuration Chapter contents Introduction 142...
Page 136: ...136 Appendix F Installation checklist Chapter contents Introduction 144...