![Motorola WiNG 5 Скачать руководство пользователя страница 153](http://html.mh-extra.com/html/motorola/wing-5/wing-5_system-reference-manual_247435153.webp)
Device Configuration 5 - 93
5.3.6.1 Defining Profile VPN Settings
Profile Security Configuration
IPSec VPN provides a secure tunnel between two networked peer access points or controllers. Administrators can define
which packets are sent within the tunnel, and how they’re protected. When a tunnelled peer sees a sensitive packet, it
creates a secure tunnel and sends the packet through the tunnel to its remote peer destination.
Tunnels are sets of
security associations
(SA) between two peers. SAs define the protocols and algorithms applied to
sensitive packets and specify the keying mechanisms used by tunnelled peers. SAs are unidirectional and exist in both the
inbound and outbound direction. SAs are established per the rules and conditions of defined security protocols (AH or ESP).
Use
crypto maps
to configure IPSec VPN SAs. Crypto maps combine the elements comprising IPSec SAs. Crypto maps also
include
transform sets
. A transform set is a combination of security protocols, algorithms and other settings applied to
IPSec protected traffic. One crypto map is utilized for each IPsec peer, however for remote VPN deployments one crypto
map is used for all the remote IPsec peers.
Internet Key Exchange
(IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE enhances
IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE automatically
negotiates IPSec SAs, and enables secure communications without time consuming manual pre-configuration.
To define a profile’s VPN settings:
1. Select the
Configuration
tab from the Web UI.
2. Select
Devices
.
3. Select
System Profile
from the options on left-hand side of the UI.
4. Expand the
Security
menu and select
VPN
.
Содержание WiNG 5
Страница 1: ...Motorola Solutions WiNG 5 Access Point System Reference Guide ...
Страница 2: ......
Страница 10: ...viii WiNG 5 Access Point System Reference Guide ...
Страница 16: ...1 4 WiNG 5 Access Point System Reference Guide ...
Страница 28: ...2 12 WiNG 5 Access Point System Reference Guide ...
Страница 48: ...3 20 WiNG 5 Access Point System Reference Guide ...
Страница 197: ...Device Configuration 5 137 Figure 5 78 Profile Management Settings screen ...
Страница 335: ...Device Configuration 5 275 Figure 5 155 Profile Overrides Management Settings screen ...
Страница 348: ...5 288 WiNG 5 Access Point System Reference Guide ...
Страница 350: ...6 2 WiNG 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Страница 448: ...6 100 WiNG 5 Access Point System Reference Guide ...
Страница 492: ...8 32 WiNG 5 Access Point System Reference Guide ...
Страница 538: ...9 46 WiNG 5 Access Point System Reference Guide ...
Страница 564: ...11 10 WiNG 5 Access Point System Reference Guide ...
Страница 606: ...12 42 WiNG 5 Access Point System Reference Guide ...
Страница 732: ...13 126WiNG 5 Access Point System Reference Guide Figure 13 67 Access Point Certificate Trustpoint screen ...
Страница 762: ...A 2 WiNG 5 Access Point System Reference Guide ...
Страница 801: ......