Chapter 6 vpn configuration, Vpn configuration, Chapter 6 – Patton electronic ONSITE 2800 User Manual
Page 67

67
Chapter 6
VPN configuration
Chapter contents
..........................................................................................................................................................68
................................................................................................................................................68
......................................................................................................................................................68
...........................................................................................................................69
...................................................................................................................................69
Creating an IPsec transformation profile
.........................................................................................................69
Creating an IPsec policy profile
.......................................................................................................................70
Creating/modifying an outgoing ACL profile for IPsec
...................................................................................72
Configuration of an IP interface and the IP router for IPsec
............................................................................73
Displaying IPsec configuration information
....................................................................................................73
.............................................................................................................................................74
...........................................................................................................................................75
.........................................................................................................................75
.................................................................................................................................75
........................................................................................................................76
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96
....................76
.................................................................................................................................76
........................................................................................................................77
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96
..................77
.................................................................................................................................77
........................................................................................................................77