
287
Chapter 26
VPN configuration
Chapter contents
Introduction
........................................................................................................................................................288
Authentication
..............................................................................................................................................288
Encryption
....................................................................................................................................................288
Transport and tunnel modes
.........................................................................................................................289
Key management
..........................................................................................................................................289
VPN configuration task list
.................................................................................................................................289
Creating an IPsec transformation profile
.......................................................................................................289
Creating an IPsec policy profile
.....................................................................................................................290
Creating/modifying an outgoing ACL profile for IPsec
.................................................................................292
Configuration of an IP interface and the IP router for IPsec
.........................................................................293
Displaying IPsec configuration information
..................................................................................................293
Debugging IPsec
...........................................................................................................................................294
Key Management (IKE)
......................................................................................................................................295
Main differences between manual & IKE IPSEC configurations
.............................................................295
Creating an IPSEC transform profile
......................................................................................................296
Creating an ISAKMP transform profile
...................................................................................................296
Creating an ISAKMP IPSEC policy profile
.............................................................................................296
Creating/modifying an outgoing ACL profile for IPSEC
.........................................................................298
Configuration of an IP interface and the IP router for IPSEC
.................................................................298
Policy matching
......................................................................................................................................298
Sample configuration snippet
..................................................................................................................298
Troubleshooting
...........................................................................................................................................299
Using an alternate source IP address for specific destinations
...................................................................299
Sample configurations
.........................................................................................................................................300
IPsec tunnel, DES encryption
.......................................................................................................................300
IPLink configuration
...............................................................................................................................300
Cisco router configuration
......................................................................................................................301
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
..................301
IPLink configuration
...............................................................................................................................301
Cisco router configuration
......................................................................................................................302
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
................302
IPLink configuration
...............................................................................................................................302
Cisco router configuration
......................................................................................................................302
Содержание IPLink Series
Страница 309: ...309 Appendix B Mode summary Chapter contents Introduction 310...
Страница 312: ...Introduction 312 IPLink Software Configuration Guide B Mode summary...
Страница 325: ...325 Appendix D Internetworking terms acronyms Chapter contents Abbreviations 326...
Страница 330: ...330 Appendix E Used IP ports in the IPLink software Chapter contents Used IP ports in the IPLink software 331...