IPsec parameters
Digi TransPort User Guide
408
IPsec Groups
This mode of operation can be used when the router is terminating tunnels to a large number of
remote devices such as when being used as a VPN Concentrator. To keep the size of the
configuration file in the router small and also to maintain ease of configuration, only the
information that is used for all tunnels is stored on the router. All other information that is site
specific is stored in a MySQL database. This means the number of sites that can be configured is
limited only by the SQL database size and performance. This will be literally millions of sites,
depending upon the operating system and hardware of the MySQL PC. The number of sites that
can be connected to concurrently are much smaller and limited by the model of the router.
• The router with the IPsec Group/MySQL configuration is the VPN Concentrator.
• The remote sites will normally not require an IPsec group configuration as they will normally
only need to connect to a single peer, the VPN Concentrator.
• The VPN Concentrator will normally need only a single IPsec group configured.
• The local and remote subnet parameters need to be set up wide enough to encompass all the
local and remote networks.
• The VPN Concentrator can act as an initiator and/or a responder. In situations where there are
more remote sites than the router can support concurrent sessions, it will normally be
necessary for the VPN Concentrator and the remote sites to be both an initiator and a
responder. This is so both the remote sites and the head-end can initiate the IPsec session
when required.
• It is also important to configure the IPsec tunnels to time out on inactivity to free up sessions
for other sites. In the case of the VPN Concentrator acting as an initiator, when it receives a
packet that matches the main IPsec tunnel, if no Security Associations already exist, it looks up
the required parameters in the database.
• The TransPort will then create a dynamic IP tunnel containing all the settings from the base
IPsec tunnel and all the information retrieved from the database.
• At this point, IKE will create the tunnel (IPsec security associations) as normal.
• The dynamic IPsec tunnel will continue to exist until all the IPsec Security Associations have
been removed.
• When the maximum supported (or licensed) number of tunnels has been reached by the
router, the oldest Dynamic IPsec tunnels (those that have not been used for the longest
period of time) and their associated IPsec Security Associations are dropped, to allow new
inbound VPNs to connect.
Содержание TransPort
Страница 1: ...User Guide Digi TransPort ...
Страница 95: ...Regulatory and safety statements Digi TransPort User Guide 95 TransPort WR41Declaration of Conformity ...
Страница 96: ...Regulatory and safety statements Digi TransPort User Guide 96 ...
Страница 97: ...Regulatory and safety statements Digi TransPort User Guide 97 TransPort WR44 Declaration of Conformity ...
Страница 773: ...Manage files Digi TransPort User Guide 773 For example ...