DRA-2 UNIVERSAL COMMUNICATION NODE
57/158
USER GUIDE - Rev.5 (January 2018)
5.4.2
Tunnel configuration
A tunnel can be defined as a virtual connection which emulates an end-to-end connection
between two nodes connected through a complex network, which may be public like
Internet or private.
To configure a tunnel, it is necessary to define the start and end points of the tunnel and the
traffic to be sent through it.
There are two types of unsafe (unencrypted) tunnels: IPIP and GRE. The difference
between them is that IPIP tunnels can only encapsulate IPv4unicast traffic, whereas GRE
tunnels admit multicast traffic.
To guarantee privacy and safety, the data circulating on the tunnel can be encrypted
through the IPSec cipher protocol. It can be configured through the
VPN
menu.
FIGURE 22
Tunnel
submenu in the
WAN
menu
The configuration parameters are:
•
Tunnel ID.
This establishes the name of the virtual tunnel-like device.
•
Type.
This establishes the desired tunnel type; GRE or IPIP.
•
Tunnel IP
. This establishes the IP address associated with the virtual tunnel
device, whose identity is the value of the
Tunnel ID
parameter. The address must
be the host address, but it admits the inclusion of the associated net mask and also
its configuration in an indirect form, through the equipment device identifier, in
which case the IP address configured in this interface is assigned with a host mask.
Содержание DRA-2
Страница 117: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 117 158 USER GUIDE Rev 5 January 2018 APPENDIX A BIBLIOGRAPHY AND ABBREVIATIONS...
Страница 122: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 122 158 USER GUIDE Rev 5 January 2018 APPENDIX B DATA STRUCTURE IN CLI...
Страница 156: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 156 158 USER GUIDE Rev 5 January 2018 APPENDIX C WIDEBAND PLC COUPLERS...