360
Chapter 32
VPN configuration
Chapter contents
Introduction
........................................................................................................................................................361
Authentication
..............................................................................................................................................361
Encryption
....................................................................................................................................................361
Transport and tunnel modes
.........................................................................................................................362
Permanent IKE Tunnels
..........................................................................................................................362
Key management
..........................................................................................................................................362
VPN configuration task list
.................................................................................................................................363
Creating an IPsec transformation profile
.......................................................................................................363
Creating an IPsec policy profile
.....................................................................................................................363
Creating/modifying an outgoing ACL profile for IPsec
.................................................................................365
Configuration of an IP interface and the IP router for IPsec
..........................................................................366
Displaying IPsec configuration information
..................................................................................................366
Debugging IPsec
...........................................................................................................................................367
Key management (IKE)
.......................................................................................................................................368
Main differences between manual & IKE IPSEC configurations
.............................................................368
Creating an ISAKMP transform profile
...................................................................................................369
Creating an ISAKMP IPSEC policy profile
.............................................................................................370
Creating/modifying an outgoing ACL profile for IPSEC
.........................................................................371
Configuration of an IP interface and the IP router for IPSEC
.................................................................371
Policy matching
......................................................................................................................................371
Sample configuration snippet
..................................................................................................................371
Troubleshooting
...........................................................................................................................................372
Encrypted Voice - Performance considerations
....................................................................................................373
Performance considerations
...........................................................................................................................373
Enabling RTP encryption support
.......................................................................................................................373
Using an alternate source IP address for specific destinations
...............................................................................374
Sample configurations
.........................................................................................................................................375
IPsec tunnel, DES encryption
.......................................................................................................................375
SmartNode configuration
........................................................................................................................375
Cisco router configuration
.......................................................................................................................376
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
..................376
SmartNode configuration
........................................................................................................................376
Cisco router configuration
.......................................................................................................................376
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
................377
SmartNode configuration
........................................................................................................................377
Cisco router configuration
.......................................................................................................................377
Содержание SmartNode Series
Страница 250: ...RIP configuration task list 250 SmartWare Software Configuration Guide 23 RIP configuration rip enabled ...
Страница 635: ...635 Appendix A Terms and definitions Chapter contents Introduction 636 SmartWare architecture terms and definitions 636 ...
Страница 641: ...641 Appendix B Mode summary Chapter contents Introduction 642 ...
Страница 648: ...648 Appendix D Internetworking terms acronyms Chapter contents Abbreviations 649 ...
Страница 653: ...653 Appendix E Used IP ports available voice codecs Chapter contents Used IP ports 654 Available voice codecs 655 ...