88
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
5.9 IPSEC VLAN
The LES1600, LES1516A, LES1532A, LES1548A, and LES1700 family of advanced console servers include a Linux implementation of the
IPsec (IP Security) protocols, which can be used to configure a Virtual Private Network (VPN). The VPN allows multiple sites or remote
administrators to access the Black Box advanced console server (and Managed Devices) securely over the Internet.
The administrator can establish encrypted authenticated VPN connections between advanced console servers distributed at remote
sites and a VPN gateway (such as Cisco router running IOS IPsec) on their central office network.
Users and administrators at the central office can then securely access the remote console servers and connected serial console
devices and machines on the Management LAN subnet at the remote location as though they were local.
With serial bridging, serial data from controller at the central office machine can be securely connected to the serially controlled devices
at the remote sites (see Section 5.1).
The road warrior administrator can use a VPN IPsec software client such as TheGreenBow (https://thegreenbow.com/) or Shrew Soft
(https://shrew.net/) to remotely access the advanced console server and every machine on the Management LAN subnet at the remote
location.
Configuration of IPsec is quite complex so Black Box provides a simple GUI interface for basic set up as described below.
ENABLE THE VPN GATEWAY
Select Serial & Networks > IPsec VPN.
Click Add.
Complete the Add IPsec Tunnel screen.
Enter a descriptive name to identify the added IPsec Tunnel. For example West-St-Outlet.
Select the Authentication Method: either RSA digital signatures or a Shared secret (PSK).
If you select RSA, you will asked to click here to generate keys. This will generate an RSA public key for the console server (the
Left Public Key). You will need to find out the key to be used on the remote gateway, then cut and paste it into the Right Public
Key.
If you select Shared secret, you will need to enter a Pre-shared secret (PSK). The PSK must match the PSK configured at the
other end of the tunnel.
In Authentication Protocol, select the authentication protocol to be used. Either authenticate as part of ESP (Encapsulating
Security Payload) encryption or separately using the AH (Authentication Header) protocol.
Enter a Left ID and Right ID. This is the identifier that the Local host/gateway and remote host/gateway use for IPsec negotiation
and authentication.
Each ID must include an @ and can include a fully qualified domain name preceded by @ (for example, [email protected]).
CHAPTER 5: SERIAL PORT, HOST DEVICE AND USER CONFIG