Patton electronic ONSITE 2800 User Manual
Page 6

6
OnSite 2800 Series User Manual
Table of Contents
Configuring Channel-Group Timeslots
..........................................................................................................63
Configuring Channel-Group Encapsulation
...................................................................................................63
Entering HDLC Configuration Mode
............................................................................................................63
.....................................................................................................................64
Configuring HDLC Encapsulation
.................................................................................................................64
......................................................................................................................64
Example 1: Frame Relay without a channel-group
....................................................................................65
Example 2: Framerelay with a channel-group
............................................................................................66
Example 3: PPP without a channel-group
.................................................................................................66
Example 4: PPP with a channel-group
......................................................................................................66
6
........................................................................................................................................ 67
..........................................................................................................................................................68
................................................................................................................................................68
......................................................................................................................................................68
...........................................................................................................................69
...................................................................................................................................69
Creating an IPsec transformation profile
.........................................................................................................69
Creating an IPsec policy profile
.......................................................................................................................70
Creating/modifying an outgoing ACL profile for IPsec
...................................................................................72
Configuration of an IP interface and the IP router for IPsec
............................................................................73
Displaying IPsec configuration information
....................................................................................................73
.............................................................................................................................................74
...........................................................................................................................................75
.........................................................................................................................75
.................................................................................................................................75
........................................................................................................................76
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
....................76
.................................................................................................................................76
........................................................................................................................77
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
..................77
.................................................................................................................................77
........................................................................................................................77
7
Access control list configuration
.................................................................................................................... 79
..........................................................................................................................................................80
.......................................................................................................................................80
.........................................................................................................................................80
Why you should configure access lists
.............................................................................................................80
When to configure access lists
.........................................................................................................................81
Features of access control lists
.........................................................................................................................81
Access control list configuration task list
................................................................................................................82
Mapping out the goals of the access control list
...............................................................................................82
Creating an access control list profile and enter configuration mode
...............................................................83
Adding a filter rule to the current access control list profile
.............................................................................83