5
OnSite Model 3210 User Manual
Table of Contents
Power connection and default configuration
...................................................................................................33
Connect with the serial interface
.....................................................................................................................33
Login
..............................................................................................................................................................34
Changing the IP address
.................................................................................................................................34
2. Connect the OnSite VPN Router to the network
..............................................................................................35
3. Load configuration
............................................................................................................................................35
4
G.SHDSL Basic Configuration
..................................................................................................................... 37
Introduction
..........................................................................................................................................................38
Line Setup
.............................................................................................................................................................38
Configuring PPPoE
...............................................................................................................................................38
Configuration Summary
........................................................................................................................................39
Setting up permanent virtual circuits (PVC)
..........................................................................................................40
Using PVC channels in bridged Ethernet mode
..............................................................................................40
Using PVC channels with PPPoE
...................................................................................................................40
Diagnostics
.....................................................................................................................................................41
Troubleshooting DSL Connections
.......................................................................................................................41
5
VPN configuration
........................................................................................................................................ 42
Introduction
..........................................................................................................................................................43
Authentication
................................................................................................................................................43
Encryption
......................................................................................................................................................43
Transport and tunnel modes
...........................................................................................................................44
VPN configuration task list
...................................................................................................................................44
Creating an IPsec transformation profile
.........................................................................................................44
Creating an IPsec policy profile
.......................................................................................................................45
Creating/modifying an outgoing ACL profile for IPsec
...................................................................................47
Configuration of an IP interface and the IP router for IPsec
............................................................................48
Displaying IPsec configuration information
....................................................................................................48
Debugging IPsec
.............................................................................................................................................49
Sample configurations
...........................................................................................................................................50
IPsec tunnel, DES encryption
.........................................................................................................................50
OnSite configuration
.................................................................................................................................50
Cisco router configuration
........................................................................................................................51
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
....................51
OnSite configuration
.................................................................................................................................51
Cisco router configuration
........................................................................................................................52
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
..................52
OnSite configuration
.................................................................................................................................52
Cisco router configuration
........................................................................................................................52
6
Access control list configuration
.................................................................................................................... 54
Introduction
..........................................................................................................................................................55
About access control lists
.......................................................................................................................................55
What access lists do
.........................................................................................................................................55
Why you should configure access lists
.............................................................................................................55