Step 16: Repeat Steps 1 -15 With Suitable Modifications On Networks2 Prior To Passing Bi-Directional Traffic; Step 17: Test The Ipsec Tunnel Between Networks1 And Networks2 By Passing Traffic From The 10.0.1.0 Network To The 10.0.2.0 Network; Step 18: After Traffic Is Passed Through The Tunnel, Display The Ike And Ipsec Sa Tables; Example 4: Supporting Remote User Access - Avaya 1000 Series Configuration Manual

Secure router
Hide thumbs Also See for 1000 Series:
Table of Contents

Advertisement

Step 16: Repeat steps 1 -15 with suitable modifications on
Networks2 prior to passing bi-directional traffic
Step 17: Test the IPSec tunnel between Networks1 and Networks2
by passing traffic from the 10.0.1.0 network to the 10.0.2.0 network
Step 18: After traffic is passed through the tunnel, display the IKE
and IPSec SA tables
Networks1> show crypto ike sa all
Networks1> show crypto ike sa all detail
Networks1> show crypto ipsec sa all
Networks1> show crypto ipsec sa all detail

Example 4: Supporting Remote User Access

The following example demonstrates how to configure a router to be an IPSec VPN server
using user group method with extended authentication (XAUTH) for remote VPN clients. The
client could be any standard IPSec VPN client.
In this example, the client needs to access the corporate private network 10.0.1.0/24 through
the VPN tunnel. The security requirements are as follows:
Example
• Phase 1: 3DES with SHA1, Xauth (Radius PAP)
• Phase 2: IPSec ESP tunnel with AES256 and HMAC-SHA1
Avaya Secure Router 1000 Series Configuration Guide
Example 4: Supporting Remote User Access
December 2010
153

Advertisement

Table of Contents
loading

Table of Contents