beautypg.com
i
Contents
1 IPsec VPN Manager overview ································································································································· 1
IVM functions ····································································································································································· 1
IVM features ······································································································································································· 2
2 Quick start guide ······················································································································································ 3
Accessing IVM ··································································································································································· 3
Classic mode ···························································································································································· 3
Desktop mode ··························································································································································· 5
IVM home page ································································································································································ 6
IVM quick start wizard ·················································································································································· 12
Common operations ······················································································································································ 13
Navigating a list ···················································································································································· 13
Sorting a list ··························································································································································· 14
Prerequisites for managing VPNs in IVM ···················································································································· 14
Determining network scenarios ···································································································································· 15
Installing and deploying IMC components ·················································································································· 15
Configuring network management protocols ·············································································································· 16
Configuring SNMP ················································································································································ 16
Configuring Telnet ················································································································································· 17
Configuring SSH ···················································································································································· 17
Configuring CWMP ·············································································································································· 18
3 Managing IVM ······················································································································································· 19
Managing VPN domains ·············································································································································· 19
Viewing the VPN domain list ······························································································································· 19
Querying IPsec VPN domains ······························································································································ 19
Deleting IPsec VPN domains ································································································································ 20
Managing IPsec devices ················································································································································ 20
Viewing the IPsec device list ································································································································ 20
Querying IPsec devices ········································································································································· 21
Import IMC devices to IVM ··································································································································· 22
Importing BIMS devices to IVM···························································································································· 23
Synchronizing IPsec devices ································································································································ 24
Deleting IPsec devices ··········································································································································· 24
Setting tunnel traps ················································································································································ 24
Setting an encryption card for an IPsec device ·································································································· 25
Configuring global IPsec settings for a device ··································································································· 26
Viewing the DVPN registration information of a VAM client ··········································································· 27
Managing IPsec tunnels ················································································································································· 28
Viewing the tunnel list ··········································································································································· 29
Querying IPsec tunnels ·········································································································································· 29
Viewing IPsec tunnel details ································································································································· 30
Enabling/disabling monitoring of IPsec tunnels ································································································· 31
Deleting IPsec tunnels ············································································································································ 31
Viewing the tunnel event history ·························································································································· 31
Querying tunnel event history ······························································································································ 32
Exporting the tunnel event history ························································································································ 32
Managing IPsec proposals ············································································································································ 33
Basic concepts ······················································································································································· 33
Viewing the IPsec proposal list ···························································································································· 34