
____________________________________________________________________________________
____________________________________________________________________________________
34
VoIP subscriber gateways
When
‘Add
VLAN for
Management’
is set, configuring by using DHCP and TR-069 protocol will be available
through
‘
Management
’
service. If the checkbox is disabled, configuring by using DHCP and TR-069 protocol will
be available through
‘Internet’
.
Description of fields (accessible to configure) are described in section
3.1.2.1.1.
‘
Network settings
’
submenu,
‘
Internet
’
service.
To save changes into operative memory of the device, click
‘Save
changes’
button. To write settings into
non-volatile memory, click
‘Apply’
button.
3.1.2.2
‘
IPSec
’
submenu
Use the menu to configure encryption on IPSec (IP Security) technology. IPSec is a set of protocols to
provide data protection (data is transmitted via IP). IPSec allows you to provide authentication, integrity check
and/or IP-packets encryption. IPSec includes protocols for tamper-free key exchange in Internet.
IPSec settings:
–
IPSec enable
– permit to use IPSec protocol for data encryption;
–
Name of service
– service selection where encryption via IPSec protocol will be used;
–
Local IP address
– the device address for operation via IPSec protocol;
–
Local subnet
in cooperation with
Local netmask
determine local subnet for creation network-to-
network or network-to-point topology;
–
Remote subnet
in cooperation with
Remote netmask
determines address of remote subnet for
connection with using encryption via IPSec protocol. If mask has value 255.255.255.255 then
connection is established with a single host. Mask (distinct from 255.255.255.255) allows you to
specify whole subnet. Thus, functionality of the device allows you to organize the following 4
network topologies with using encryption traffic via IPSec protocol: point-to-point, network-to-
point, point-to-network, network-to-network;
–
Remote gateway
– gateway providing access to the remote subnet;
–
Security protocol
–
there are two key protocols: AH (Authentication header) and EPS
(Encapsulating Security Payload). The first provides data authentication except data encryption;
the second provides both operations. IPSec can operate in one of the two modes: ‘transport’ or