background image

Page 18

VSR-1200 Hardware Reference Module, Document 2

5

Do one of the following: 

a

To copy an entry, type the line number of the entry you wish to copy. 

The new entry is added to the bottom of the IP/VPN Policy Table. Return to 

Step 3

b

If you do not wish to copy an entry, press the Escape key. 

The IP/VPN Policy Table appears. Return to 

Step 3

6

To add an entry, do the following: 

a

If you do not wish to add another entry, press Escape

The IP/VPN Policy Table appears, with each new entry (if any) added to the bottom 

of the list. Return to 

Step 3

b

When screen prompts request information for this connection and its policy, type the 
information for each field, and press Enter

Note:  

When asked for the profile name that this connection policy uses, you must 

enter a profile name that already exists in the VPN Profile Table. (To create new VPN 
profiles, see 

Section 2.5.4.1, Configuring VPN Profiles

.) 

When all information has been entered, you are asked for a description. 

c

Type a name for the connection policy. 

The entry is accepted. A prompt appears for another new entry. Repeat 

Step 6

7

To insert an entry, do the following: 

A prompt asks for the line number this entry will follow. 

a

Type the line number and press Enter

Subsequent prompts request information for this connection and its policy. 

b

Type the information for each field, and press Enter

Note:  

When asked for the profile name that this connection policy uses, you must 

enter a profile name that already exists in the VPN Profile Table. (To create new VPN 
profiles, see 

Section 2.5.4.1, Configuring VPN Profiles

.) 

When all information has been entered, you are asked for a description. 

c

Type a name for the connection policy. 

The entry is accepted, and the IP/VPN Policy Table appears, with the new entry 

inserted in the list at the specified location. Go to 

Step 3

8

To delete an entry, type the entry’s line number. 

The entry is deleted, and the IP/VPN Policy Table appears. Return to 

Step 3

For more information, see the 

VPN Configuration

 Module. 

2.5.4.3

Selective Layer Encryption in VPNs 

Encore Networks has developed a proprietary technology, Selective Layer Encryption™ 
(SLE, patent pending), for VPNs that traverse a satellite network. SLE works with a satellite 

Содержание VSR-1200

Страница 1: ...ee the Configuration Module or the BANDIT Products General Hardware Reference Module See the following sections Before Installation Setting Up the Hardware Logging In Using the Main Menu Configuring t...

Страница 2: ...ervisory cable described in the Note in Step 8 a paper copy of this Installation Guide any additional accessories that you ordered Note Shipments within North America include power cables for AC outle...

Страница 3: ...ial ports to their network devices 7 Connect each power supply on the VSR 1200 chassis to an outlet supplying 100 240 VAC at 47 63 Hz 8 Use the Supervisory cable and adapter to connect the device s Su...

Страница 4: ...ution The Supervisory connection to the device will time out after five 5 minutes of console inactivity If you have changed the device s configuration and wish to use the new configuration save write...

Страница 5: ...your network see Section 2 5 1 Startup Configuration For configuration of specific features see the following sections Section 2 5 2 Device Addresses Section 2 5 3 Ports Section 2 5 4 Virtual Private...

Страница 6: ...your network s settings 4 For each item parameter in the menu do the following a Select the item for example WAN Interface IP b Type a value for the item and press Enter Startup Configuration Scenario...

Страница 7: ...press Escape to return to the Startup Configuration Scenarios menu The configuration retains the settings you have entered but they are not yet in use Return to Step 4 6 To load the new configuration...

Страница 8: ...cal Addresses menu select IP Address 3 Enter the device s IP address and press Enter Get the device s IP address from your network administrator 4 Select BANDIT Name 5 Enter a unique name to identify...

Страница 9: ...port b These are virtual Logical Ports A protocol configured on a Logical Port can be associated with a global path which is turn is associated with a physical port See Section 2 5 3 1 Protocols For...

Страница 10: ...ng on the Logical Port Attribute menu see Section 2 5 3 Ports 1 If you wish to change the protocol the port uses do all of the following a Select Undefine Current Logical Port b Select Protocol c On t...

Страница 11: ...tribute menu Go to Step 5 If you select Client the device uses this port to request its IP address On the WAN port the device requests its public IP address No further configuration is required for th...

Страница 12: ...twork Connections One of the principal features in the BANDIT family of products is the support of virtual private networks VPNs This section discusses the configuration of VPNs in the BANDIT products...

Страница 13: ...protocol for Proposal 1 in Phase 1 Ping status The users allowed to use this VPN profile 2 Do one of the following a To change parts of a profile type m Go to Step 3 b To add a profile type c Go to St...

Страница 14: ...sh to modify another field s value return to Step 3b When you have finished modifying this profile press Escape to save the new values The following prompt is displayed e Do one of the following To sa...

Страница 15: ...Internet Key Exchange To configure phase proposals for automatic keying do the following 1 On the VPN Profile Table type m to modify a line Then type the line number and press Enter See Section 2 5 4...

Страница 16: ...hat each connection uses If your connections will include VPNs across satellite networks the BANDIT device will use selective layer encryption Before configuring the IP VPN Policy Table read Section 2...

Страница 17: ...entry do all of the following Type the line number of the entry you wish to modify The entry s list of values appears Select the field you wish to change The possible values for the field are listed S...

Страница 18: ...The entry is accepted A prompt appears for another new entry Repeat Step 6 7 To insert an entry do the following A prompt asks for the line number this entry will follow a Type the line number and pre...

Страница 19: ...atellite Network Configuration Using Encore Networks SLE VPN 2 5 4 3 1 SLE Configuration The BANDIT products can use the following types of VPN software The BANDIT s regular IPsec VPN software does no...

Страница 20: ...configuration is IPsec VPN without SLE See Figure 2 10 If the Description name begins with any other initial character the configuration is IPsec VPN with SLE See Figure 2 7 You configure both types o...

Страница 21: ...o Remote 1 Action Initiate VPN Profile REMOTE 3 H 1 Action Allow 4 I Allow ALL Action Allow 1 Source Address Low 172 16 10 131 Source Address High 172 16 10 131 Source TCP UDP Port Low Source TCP UDP...

Страница 22: ...is section discusses additional IP components you must configure in order to use the VSR 1 On the Advanced Configurations menu select Routing 2 On the Routing menu select IP Routing The IP Routing Con...

Страница 23: ...nd configure Static Routing Follow the procedure for static routing in Section 2 1 3 Static Routing of IP Routing in the BANDIT Products For more information see IP Routing in the BANDIT Products 2 5...

Страница 24: ...heme according to your network plan e g for masquerading or for a NAT table For more information see Network Address Translation in the Address Translation Module 2 5 5 4 Firewall The default settings...

Страница 25: ...configuration before you reset or exit the VSR or before the connection times out the configuration will be lost After the unit has been configured save write the configuration Do the following 1 On...

Страница 26: ...ation Otherwise the changes you configured will be lost See Section 2 6 Saving Writing the Device s Configuration To exit the session do the following 1 On the Main Menu select Exit Session The follow...

Отзывы: