Vocality User Manual
User Manual for V200
Valid for V08_08.02 or V08_48.02
Page 70 of 114
Step 6
Finally, go to
‡Tunnelling Policies > IPSec Tunnel Policy menu
(see Figure 5-29 ).
Set SourceAddr to one of your local address names, assigned in Step 4 or 'ANY'.
Set DestAddr to one of your target address names, assigned in Step 5 or 'ANY'.
Set Tunnel to your tunnel SA name, assigned in Step 3 .
Configure your Peer IPSec device to the equivalent settings.
5.10.3 Logs
Messages are generated in the
Diagnostics > Slot n > Logs > IP Log
when IKE security
associations are created, deleted or fail to establish.
5.10.4 Diagnostics
There is a
Diagnostics > Slot n > IP > IPSec SAs menu
. This presents a summary of
each security association currently in use on the unit. Each line on the menu represents
a separate SA.
Note: SAs are connectionless entities. Their presence in this table and indeed
statistics showing data usage on outgoing SAs are not an indication that the SA
has been successfully established, particularly for manually-keyed SAs. However,
the presence of IKE SAs in the table is an indication that the SA has been
successfully negotiated with the IKE peer.
Figure 5-32 IPSec SAs diagnostics menu
Refer to the
Menus
appendix for details of all the parameters that can be set.
5.11 ‡Configuring SSH
SSH requires the Security software (RTUSEC)
and a Feature Key on all products.