Configuration Guide
7. IPSec Tunneling
Version 7.2
29
Security Setup
7
IPSec Tunneling
The device supports the IPSec tunnel protocol. IPSec tunnels encrypt sessions between two
points. These points could be single computers, network segment or selected hosts. The
IPSec encryption uses the AES, 3DES or DES algorithms.
There are many practical uses for encrypting data. For example, if some corporation would
like to provide guest access to the internet for the corporation guests, but also the corporation
would like to protect itself from corporate espionage, it is a good practice to use IPSec.
Figure 7-1: IPSec and Guest Access
In the example above, the Corporate Branch Users are connected through the IPSec tunnel
to the Corporate HQ. The communication is encrypted using IPSec, and the Guest Users, or
anyone on the Internet are not able to "read" and understand the traffic between the
segments. This solution is also applicable to other applications that need to encrypt traffic
such as protecting classified project in the same organization.
To configure IPSec, use the following commands:
Table 7-1: IPsec Tunneling
Command
Description
# configure data
Enter the data configuration menu.
(config-data)# access-list ipsec
permit ip 192.168.0.0 0.0.0.255
10.0.0.0 0.0.0.255
Create an ACL to capture traffic for IPSec. This
will later become an entry in the routing table.
(config-data)# crypto isakmp
policy 1
Configure the isakmp policy.
(config-isakmp)# encryption aes
128
Configure the encryption protocol (AES, DES or
3DES). The number is the amount of bits for the
encryption protocol.
(config-isakmp)# authentication
pre-share
Choose an authentication method (pre-shared
key or Rivest-Shamir-Adleman Signature).
(config-isakmp)# hash sha
Configures the hashing protocol (sha, sha256,
or md5). The sha protocol is stronger than md5.
Содержание Mediant 500L MSBR
Страница 2: ......
Страница 4: ...Mediant MSBRs 4 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 8: ...Mediant MSBRs 8 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 12: ...Mediant MSBRs 12 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 16: ...Mediant MSBRs 16 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 18: ...Mediant MSBRs 18 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 24: ...Mediant MSBRs 24 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 28: ...Mediant MSBRs 28 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 54: ...Mediant MSBRs 54 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 62: ...Mediant MSBRs 62 Document LTRT 31828 Security Setup This page is intentionally left blank...
Страница 72: ...Mediant MSBRs 72 Document LTRT 31828 Security Setup This page is intentionally left blank...