SIP-2
56/145
USER GUIDE - Rev. 3 (January 2018)
There are two types of unsafe (unencrypted) tunnels: IPIP and GRE. The difference
between them is that IPIP tunnels can only encapsulate IPv4unicast traffic, whereas GRE
tunnels admit multicast traffic.
To guarantee privacy and safety, the data circulating on the tunnel can be encrypted
through the IPSec cipher protocol. It can be configured through the
VPN
menu.
FIGURE 26
Tunnel
submenu of the
WAN
menu
The configuration parameters are:
•
Tunnel ID.
This establishes the name of the virtual tunnel-like device.
•
Type.
This establishes the desired tunnel type; GRE or IPIP.
•
Tunnel IP
. This establishes the IP address associated with the virtual tunnel
device, whose identity is the value of the
Tunnel ID
parameter. The address must
be the host address, but it admits the inclusion of the associated net mask and also
its configuration in an indirect form, through the equipment device identifier, in
which case the IP address configured in this interface is assigned with a host mask.
•
Tunnel Source
. This establishes the local interface through which the tunnel traffic
will be routed. In the case of WAN interfaces, it may be
cell0-0
(identifies SIM A) or
cell0-1
(identifies SIM B). Otherwise, it will be a virtual network identifier from one
of the VLANs in the equipment.
•
Remote GW
. This establishes the IP address of the equipment at the other end of
the tunnel, that is to say, the terminator.
•
Remote network
. The remote subnetwork connected to the point at the end of the
tunnel (Remote GW) whose traffic passes through the tunnel. If
any
is selected, all
traffic not accessible locally or based on specific rules will be sent through the
tunnel.