![background image](http://html1.mh-extra.com/html/patton-electronics/onsite-2800-series/onsite-2800-series_user-manual_4085019006.webp)
6
OnSite 2800 Series User Manual
Table of Contents
Configuring Channel-Group Timeslots
..........................................................................................................63
Configuring Channel-Group Encapsulation
...................................................................................................63
Entering HDLC Configuration Mode
............................................................................................................63
Configuring HDLC CRC-Type
.....................................................................................................................64
Configuring HDLC Encapsulation
.................................................................................................................64
T1/E1 Configuration Examples
......................................................................................................................64
Example 1: Frame Relay without a channel-group
....................................................................................65
Example 2: Framerelay with a channel-group
............................................................................................66
Example 3: PPP without a channel-group
.................................................................................................66
Example 4: PPP with a channel-group
......................................................................................................66
6
VPN configuration
........................................................................................................................................ 67
Introduction
..........................................................................................................................................................68
Authentication
................................................................................................................................................68
Encryption
......................................................................................................................................................68
Transport and tunnel modes
...........................................................................................................................69
VPN configuration task list
...................................................................................................................................69
Creating an IPsec transformation profile
.........................................................................................................69
Creating an IPsec policy profile
.......................................................................................................................70
Creating/modifying an outgoing ACL profile for IPsec
...................................................................................72
Configuration of an IP interface and the IP router for IPsec
............................................................................73
Displaying IPsec configuration information
....................................................................................................73
Debugging IPsec
.............................................................................................................................................74
Sample configurations
...........................................................................................................................................75
IPsec tunnel, DES encryption
.........................................................................................................................75
OnSite configuration
.................................................................................................................................75
Cisco router configuration
........................................................................................................................76
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
....................76
OnSite configuration
.................................................................................................................................76
Cisco router configuration
........................................................................................................................77
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
..................77
OnSite configuration
.................................................................................................................................77
Cisco router configuration
........................................................................................................................77
7
Access control list configuration
.................................................................................................................... 79
Introduction
..........................................................................................................................................................80
About access control lists
.......................................................................................................................................80
What access lists do
.........................................................................................................................................80
Why you should configure access lists
.............................................................................................................80
When to configure access lists
.........................................................................................................................81
Features of access control lists
.........................................................................................................................81
Access control list configuration task list
................................................................................................................82
Mapping out the goals of the access control list
...............................................................................................82
Creating an access control list profile and enter configuration mode
...............................................................83
Adding a filter rule to the current access control list profile
.............................................................................83