beautypg.com

Patton electronic ONSITE 2800 User Manual

Page 6

background image

6

OnSite 2800 Series User Manual

Table of Contents

Configuring Channel-Group Timeslots

..........................................................................................................63

Configuring Channel-Group Encapsulation

...................................................................................................63

Entering HDLC Configuration Mode

............................................................................................................63

Configuring HDLC CRC-Type

.....................................................................................................................64

Configuring HDLC Encapsulation

.................................................................................................................64

T1/E1 Configuration Examples

......................................................................................................................64

Example 1: Frame Relay without a channel-group

....................................................................................65

Example 2: Framerelay with a channel-group

............................................................................................66

Example 3: PPP without a channel-group

.................................................................................................66

Example 4: PPP with a channel-group

......................................................................................................66

6

VPN configuration

........................................................................................................................................ 67

Introduction

..........................................................................................................................................................68

Authentication

................................................................................................................................................68

Encryption

......................................................................................................................................................68

Transport and tunnel modes

...........................................................................................................................69

VPN configuration task list

...................................................................................................................................69

Creating an IPsec transformation profile

.........................................................................................................69

Creating an IPsec policy profile

.......................................................................................................................70

Creating/modifying an outgoing ACL profile for IPsec

...................................................................................72

Configuration of an IP interface and the IP router for IPsec

............................................................................73

Displaying IPsec configuration information

....................................................................................................73

Debugging IPsec

.............................................................................................................................................74

Sample configurations

...........................................................................................................................................75

IPsec tunnel, DES encryption

.........................................................................................................................75

OnSite configuration

.................................................................................................................................75

Cisco router configuration

........................................................................................................................76

IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96

....................76

OnSite configuration

.................................................................................................................................76

Cisco router configuration

........................................................................................................................77

IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96

..................77

OnSite configuration

.................................................................................................................................77

Cisco router configuration

........................................................................................................................77

7

Access control list configuration

.................................................................................................................... 79

Introduction

..........................................................................................................................................................80

About access control lists

.......................................................................................................................................80

What access lists do

.........................................................................................................................................80

Why you should configure access lists

.............................................................................................................80

When to configure access lists

.........................................................................................................................81

Features of access control lists

.........................................................................................................................81

Access control list configuration task list

................................................................................................................82

Mapping out the goals of the access control list

...............................................................................................82

Creating an access control list profile and enter configuration mode

...............................................................83

Adding a filter rule to the current access control list profile

.............................................................................83