background image

VSR-1200™ and RDU™ Installation and Quick Configuration Guide

Page 17

3

Do one of the following: 

a

To modify an entry, type m. Go to 

Step 4

b

To copy an entry, type c. Go to 

Step 5

c

To add an entry to the bottom of the list, type a. Go to 

Step 6

d

To add (insert) an entry at a specified point in the list, type i. Go to 

Step 7

e

To delete an entry, type d. Go to 

Step 8

f

To return to the Virtual Private Network Configuration menu, press the Escape key 
twice. 

The Virtual Private Network Configuration menu appears. Go to 

Section 2.5.4, 

Virtual Private Network Connections

4

Do one of the following: 

a

To modify an entry, do all of the following: 

• Type the line number of the entry you wish to modify. 

The entry’s list of values appears. 

• Select the field you wish to change. 

The possible values for the field are listed. 

• Select the new value for the field. 

The new value is accepted, and the entry’s list of values appears again. 

b

To return to the IP/VPN Policy Table, press the Escape key. 

A prompt asks whether you wish to save the changes you made. 

c

Answer yes (or no, if you decide not to keep the changes). 

The IP/VPN Policy Table appears. Return to 

Step 3

Source       Src    Destination     Dest   Protocol

#      Address      Port

Address       

Port   /Flag    Path Name  I/O Action

--- --------------- ------ --------------- ------ -------- ---------- --- ------

  1        10.5.6.0    *        172.23.9.0    *          *     *        *

         10.5.6.255    *      172.23.9.255    *

    Tunnel To Remote 1 Action: Initiate VPN Profile: Remote

  2        *           *          *           *          *     *        *

           *           *          *           *

    Allow ALL Action: Allow

Add, Modify, Insert, Copy or Delete an Entry? - (A/M/I/C/D) : a

Содержание VSR-1200

Страница 1: ...ee the Configuration Module or the BANDIT Products General Hardware Reference Module See the following sections Before Installation Setting Up the Hardware Logging In Using the Main Menu Configuring t...

Страница 2: ...ervisory cable described in the Note in Step 8 a paper copy of this Installation Guide any additional accessories that you ordered Note Shipments within North America include power cables for AC outle...

Страница 3: ...ial ports to their network devices 7 Connect each power supply on the VSR 1200 chassis to an outlet supplying 100 240 VAC at 47 63 Hz 8 Use the Supervisory cable and adapter to connect the device s Su...

Страница 4: ...ution The Supervisory connection to the device will time out after five 5 minutes of console inactivity If you have changed the device s configuration and wish to use the new configuration save write...

Страница 5: ...your network see Section 2 5 1 Startup Configuration For configuration of specific features see the following sections Section 2 5 2 Device Addresses Section 2 5 3 Ports Section 2 5 4 Virtual Private...

Страница 6: ...your network s settings 4 For each item parameter in the menu do the following a Select the item for example WAN Interface IP b Type a value for the item and press Enter Startup Configuration Scenario...

Страница 7: ...press Escape to return to the Startup Configuration Scenarios menu The configuration retains the settings you have entered but they are not yet in use Return to Step 4 6 To load the new configuration...

Страница 8: ...cal Addresses menu select IP Address 3 Enter the device s IP address and press Enter Get the device s IP address from your network administrator 4 Select BANDIT Name 5 Enter a unique name to identify...

Страница 9: ...port b These are virtual Logical Ports A protocol configured on a Logical Port can be associated with a global path which is turn is associated with a physical port See Section 2 5 3 1 Protocols For...

Страница 10: ...ng on the Logical Port Attribute menu see Section 2 5 3 Ports 1 If you wish to change the protocol the port uses do all of the following a Select Undefine Current Logical Port b Select Protocol c On t...

Страница 11: ...tribute menu Go to Step 5 If you select Client the device uses this port to request its IP address On the WAN port the device requests its public IP address No further configuration is required for th...

Страница 12: ...twork Connections One of the principal features in the BANDIT family of products is the support of virtual private networks VPNs This section discusses the configuration of VPNs in the BANDIT products...

Страница 13: ...protocol for Proposal 1 in Phase 1 Ping status The users allowed to use this VPN profile 2 Do one of the following a To change parts of a profile type m Go to Step 3 b To add a profile type c Go to St...

Страница 14: ...sh to modify another field s value return to Step 3b When you have finished modifying this profile press Escape to save the new values The following prompt is displayed e Do one of the following To sa...

Страница 15: ...Internet Key Exchange To configure phase proposals for automatic keying do the following 1 On the VPN Profile Table type m to modify a line Then type the line number and press Enter See Section 2 5 4...

Страница 16: ...hat each connection uses If your connections will include VPNs across satellite networks the BANDIT device will use selective layer encryption Before configuring the IP VPN Policy Table read Section 2...

Страница 17: ...entry do all of the following Type the line number of the entry you wish to modify The entry s list of values appears Select the field you wish to change The possible values for the field are listed S...

Страница 18: ...The entry is accepted A prompt appears for another new entry Repeat Step 6 7 To insert an entry do the following A prompt asks for the line number this entry will follow a Type the line number and pre...

Страница 19: ...atellite Network Configuration Using Encore Networks SLE VPN 2 5 4 3 1 SLE Configuration The BANDIT products can use the following types of VPN software The BANDIT s regular IPsec VPN software does no...

Страница 20: ...configuration is IPsec VPN without SLE See Figure 2 10 If the Description name begins with any other initial character the configuration is IPsec VPN with SLE See Figure 2 7 You configure both types o...

Страница 21: ...o Remote 1 Action Initiate VPN Profile REMOTE 3 H 1 Action Allow 4 I Allow ALL Action Allow 1 Source Address Low 172 16 10 131 Source Address High 172 16 10 131 Source TCP UDP Port Low Source TCP UDP...

Страница 22: ...is section discusses additional IP components you must configure in order to use the VSR 1 On the Advanced Configurations menu select Routing 2 On the Routing menu select IP Routing The IP Routing Con...

Страница 23: ...nd configure Static Routing Follow the procedure for static routing in Section 2 1 3 Static Routing of IP Routing in the BANDIT Products For more information see IP Routing in the BANDIT Products 2 5...

Страница 24: ...heme according to your network plan e g for masquerading or for a NAT table For more information see Network Address Translation in the Address Translation Module 2 5 5 4 Firewall The default settings...

Страница 25: ...configuration before you reset or exit the VSR or before the connection times out the configuration will be lost After the unit has been configured save write the configuration Do the following 1 On...

Страница 26: ...ation Otherwise the changes you configured will be lost See Section 2 6 Saving Writing the Device s Configuration To exit the session do the following 1 On the Main Menu select Exit Session The follow...

Отзывы: