background image

VSR-1200™ and RDU™ Installation and Quick Configuration Guide

Page 13

2.5.4.1

Configuring VPN Profiles 

To configure VPN profiles, do the following:

1

On the Virtual Private Network Configuration menu, select VPN Profiles. (See 

Section 2.5.4, Virtual Private Network Connections

.) 

The VPN Profile Table appears. Each VPN profile lists the following: 

• The record number (line number) 

• The VPN connection’s profile name 

• The tunneling mode the profile uses 

• The IP address of the remote VPN gateway (the gateway at the other end of the VPN 

connection) 

• The first negotiation scheme this local BANDIT device proposes for the connection 

Note:  

For autokeyed connections, the table shows the authentication mode, 

authentication group, encryption protocol, and authentication protocol for Proposal 1 
in Phase 1. 

• Ping  status 

• The users allowed to use this VPN profile 

2

Do one of the following: 

a

To change parts of a profile, type m. Go to 

Step 3

b

To add a profile, type c. Go to 

Step 4

c

To delete a profile, type d. Go to 

Step 5

d

To return to the Virtual Private Network Configuration menu, press Escape

The Virtual Private Network Configuration menu is redisplayed. 

3

To modify an entry in the VPN Profile Table, do all of the following: 

a

Enter the line number of the profile to modify. (Line numbers are listed under the 
heading label No.

The fields for the selected VPN profile are displayed. 

VPN PROFILE ENTRY

----------------------------

 1) Profile Name: AGGR_G2

 2) Tunneling Mode: AGGRESSIVE

 3) VPN Gateway: 0.0.0.0

 4) User ID:

 5) Pre-shared Key: *****

 6) Phase 1 Ping : Disabled     Idle Time: 120 seconds

 7) Phase 2 Ping : Disabled     Idle Time: 120 seconds

 8) Monitor Ping : Disabled     Idle Time: 120 seconds

 9) Phase 1 Proposal

10) Phase 2 Proposal

Enter the number of the item to change:

Содержание VSR-1200

Страница 1: ...ee the Configuration Module or the BANDIT Products General Hardware Reference Module See the following sections Before Installation Setting Up the Hardware Logging In Using the Main Menu Configuring t...

Страница 2: ...ervisory cable described in the Note in Step 8 a paper copy of this Installation Guide any additional accessories that you ordered Note Shipments within North America include power cables for AC outle...

Страница 3: ...ial ports to their network devices 7 Connect each power supply on the VSR 1200 chassis to an outlet supplying 100 240 VAC at 47 63 Hz 8 Use the Supervisory cable and adapter to connect the device s Su...

Страница 4: ...ution The Supervisory connection to the device will time out after five 5 minutes of console inactivity If you have changed the device s configuration and wish to use the new configuration save write...

Страница 5: ...your network see Section 2 5 1 Startup Configuration For configuration of specific features see the following sections Section 2 5 2 Device Addresses Section 2 5 3 Ports Section 2 5 4 Virtual Private...

Страница 6: ...your network s settings 4 For each item parameter in the menu do the following a Select the item for example WAN Interface IP b Type a value for the item and press Enter Startup Configuration Scenario...

Страница 7: ...press Escape to return to the Startup Configuration Scenarios menu The configuration retains the settings you have entered but they are not yet in use Return to Step 4 6 To load the new configuration...

Страница 8: ...cal Addresses menu select IP Address 3 Enter the device s IP address and press Enter Get the device s IP address from your network administrator 4 Select BANDIT Name 5 Enter a unique name to identify...

Страница 9: ...port b These are virtual Logical Ports A protocol configured on a Logical Port can be associated with a global path which is turn is associated with a physical port See Section 2 5 3 1 Protocols For...

Страница 10: ...ng on the Logical Port Attribute menu see Section 2 5 3 Ports 1 If you wish to change the protocol the port uses do all of the following a Select Undefine Current Logical Port b Select Protocol c On t...

Страница 11: ...tribute menu Go to Step 5 If you select Client the device uses this port to request its IP address On the WAN port the device requests its public IP address No further configuration is required for th...

Страница 12: ...twork Connections One of the principal features in the BANDIT family of products is the support of virtual private networks VPNs This section discusses the configuration of VPNs in the BANDIT products...

Страница 13: ...protocol for Proposal 1 in Phase 1 Ping status The users allowed to use this VPN profile 2 Do one of the following a To change parts of a profile type m Go to Step 3 b To add a profile type c Go to St...

Страница 14: ...sh to modify another field s value return to Step 3b When you have finished modifying this profile press Escape to save the new values The following prompt is displayed e Do one of the following To sa...

Страница 15: ...Internet Key Exchange To configure phase proposals for automatic keying do the following 1 On the VPN Profile Table type m to modify a line Then type the line number and press Enter See Section 2 5 4...

Страница 16: ...hat each connection uses If your connections will include VPNs across satellite networks the BANDIT device will use selective layer encryption Before configuring the IP VPN Policy Table read Section 2...

Страница 17: ...entry do all of the following Type the line number of the entry you wish to modify The entry s list of values appears Select the field you wish to change The possible values for the field are listed S...

Страница 18: ...The entry is accepted A prompt appears for another new entry Repeat Step 6 7 To insert an entry do the following A prompt asks for the line number this entry will follow a Type the line number and pre...

Страница 19: ...atellite Network Configuration Using Encore Networks SLE VPN 2 5 4 3 1 SLE Configuration The BANDIT products can use the following types of VPN software The BANDIT s regular IPsec VPN software does no...

Страница 20: ...configuration is IPsec VPN without SLE See Figure 2 10 If the Description name begins with any other initial character the configuration is IPsec VPN with SLE See Figure 2 7 You configure both types o...

Страница 21: ...o Remote 1 Action Initiate VPN Profile REMOTE 3 H 1 Action Allow 4 I Allow ALL Action Allow 1 Source Address Low 172 16 10 131 Source Address High 172 16 10 131 Source TCP UDP Port Low Source TCP UDP...

Страница 22: ...is section discusses additional IP components you must configure in order to use the VSR 1 On the Advanced Configurations menu select Routing 2 On the Routing menu select IP Routing The IP Routing Con...

Страница 23: ...nd configure Static Routing Follow the procedure for static routing in Section 2 1 3 Static Routing of IP Routing in the BANDIT Products For more information see IP Routing in the BANDIT Products 2 5...

Страница 24: ...heme according to your network plan e g for masquerading or for a NAT table For more information see Network Address Translation in the Address Translation Module 2 5 5 4 Firewall The default settings...

Страница 25: ...configuration before you reset or exit the VSR or before the connection times out the configuration will be lost After the unit has been configured save write the configuration Do the following 1 On...

Страница 26: ...ation Otherwise the changes you configured will be lost See Section 2 6 Saving Writing the Device s Configuration To exit the session do the following 1 On the Main Menu select Exit Session The follow...

Отзывы: