beautypg.com
ii
Querying IPsec proposals ····································································································································· 34
Viewing the IPsec proposal details ······················································································································ 35
Adding an IPsec proposal ···································································································································· 35
Modifying an IPsec proposal ······························································································································· 36
Deleting IPsec proposals ······································································································································· 36
Managing IKE proposals ··············································································································································· 36
Viewing the IKE proposal list ······························································································································· 37
Querying IKE proposals ········································································································································ 37
Viewing the IKE proposal details ························································································································· 38
Adding an IKE proposal ······································································································································· 38
Modifying an IKE proposal ·································································································································· 39
Deleting IKE proposals ·········································································································································· 39
Managing DVPN security configuration ······················································································································ 39
Viewing the DVPN security configuration list ····································································································· 40
Modifying a DVPN security configuration ·········································································································· 42
Configuring IVM service parameters ··························································································································· 44
Modifying BIMS server parameters ····················································································································· 44
Modifying BIMS device parameters ···················································································································· 45
Modifying monitor settings ··································································································································· 47
Monitoring tunnels and VPN domains ························································································································· 48
Viewing the IPsec tunnel monitoring statistics ····································································································· 48
Viewing the VPN domain monitoring data ········································································································ 50
Managing VPN domain topologies ····························································································································· 51
VPN domain topology types ································································································································ 51
Access the VPN domain topology page ············································································································· 53
Viewing the VPN domain topology ····················································································································· 54
4 Building VPN networks with IVM ·························································································································· 61
Building an IPsec VPN network ···································································································································· 61
Adding IPsec devices ············································································································································ 62
Adding IPsec VPN domains ································································································································· 62
Adding IPsec tunnels ············································································································································· 65
Configuring existing IPsec tunnels ······················································································································· 69
Deploying IPsec tunnels ········································································································································ 75
Building a GRE over IPsec VPN network ····················································································································· 76
Adding IPsec devices ············································································································································ 76
Adding GRE over IPsec VPN domains ················································································································ 76
Adding GRE over IPsec tunnels ···························································································································· 79
Configuring existing GRE over IPsec tunnels ······································································································ 84
Deploying GRE over IPsec tunnels ······················································································································· 91
Building a DVPN network ············································································································································· 91
Adding IPsec devices ············································································································································ 92
Adding DVPN domains ········································································································································ 92
5 Building VPN networks with IVM and BIMS ······································································································ 104
Building an IPsec VPN network ·································································································································· 104
Adding IPsec devices ·········································································································································· 105
Adding IPsec VPN domains ······························································································································· 105
Adding IPsec tunnels ··········································································································································· 108
Configuring existing IPsec tunnels ····················································································································· 111
Deploying IPsec tunnels ······································································································································ 117
Building a GRE over IPsec VPN network ··················································································································· 118
Adding IPsec devices ·········································································································································· 118
Adding GRE over IPsec VPN domains ·············································································································· 118
Adding GRE over IPsec tunnels ·························································································································· 121