Siemens RUGGEDCOM ROX II User Manual page 23

Hide thumbs Also See for RUGGEDCOM ROX II:
Table of Contents

Advertisement

RUGGEDCOM ROX II
CLI User Guide
12.7.1  Viewing Statistics for GRE Tunnels ................................................................................. 399
12.7.2  Viewing a List of GRE Tunnels ....................................................................................... 400
12.7.3  Adding a GRE Tunnel .................................................................................................... 401
12.7.4  Configuring a DSCP Marking for GRE Tunnel Traffic ......................................................... 402
12.7.5  Enabling/Disabling Keepalive Messages .......................................................................... 402
12.7.6  Deleting a GRE Tunnel .................................................................................................. 403
12.8  Managing IPsec Tunnels .......................................................................................................... 404
12.8.1  IPsec Tunneling Concepts .............................................................................................. 404
12.8.1.1  IPsec Modes ...................................................................................................... 405
12.8.1.2  Supported Encryption Protocols .......................................................................... 405
12.8.1.3  Public and Secret Key Cryptography .................................................................... 405
12.8.1.4  X509 Certificates ............................................................................................... 406
12.8.1.5  NAT Traversal .................................................................................................... 406
12.8.1.6  Remote IPsec Client Support ............................................................................... 406
12.8.1.7  IPsec and Router Interfaces ................................................................................ 407
12.8.2  Configuring IPsec Tunnels ............................................................................................. 407
12.8.3  Configuring Certificates and Keys .................................................................................. 408
12.8.4  Viewing the IPsec Tunnel Status .................................................................................... 408
12.8.5  Managing Pre-Shared Keys ............................................................................................ 409
12.8.5.1  Viewing a List of Pre-Shared Keys ....................................................................... 410
12.8.5.2  Adding a Pre-Shared Key .................................................................................... 410
12.8.5.3  Deleting a Pre-Shared Key .................................................................................. 410
12.8.6  Managing Connections ................................................................................................. 411
12.8.6.1  Viewing a List of Connections ............................................................................. 411
12.8.6.2  Adding a Connection ......................................................................................... 412
12.8.6.3  Configuring Dead Peer Detection ........................................................................ 413
12.8.6.4  Deleting a Connection ....................................................................................... 414
12.8.6.5  Viewing the Status of a Connection .................................................................... 414
12.8.7  Managing the Internet Key Exchange (IKE) Protocol ........................................................ 415
12.8.7.1  Viewing a List of IKE Algorithms ......................................................................... 415
12.8.7.2  Adding an IKE Algorithm .................................................................................... 416
12.8.7.3  Deleting an IKE Algorithm .................................................................................. 416
12.8.8  Managing the Encapsulated Security Payload (ESP) Protocol ............................................ 417
12.8.8.1  Configuring ESP Encryption ................................................................................ 417
12.8.8.2  Viewing a List of ESP Algorithms ......................................................................... 417
12.8.8.3  Adding an ESP Algorithm ................................................................................... 418
12.8.8.4  Deleting an ESP Algorithm ................................................................................. 418
12.8.9  Configuring the Connection Ends .................................................................................. 419
12.8.10  Managing Private Subnets ........................................................................................... 420
12.8.10.1  Configuring Private Subnets for Connection Ends ............................................... 421
 
Table of Contents
xxiii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents