RUGGEDCOM ROX II
CLI User Guide
12.7.1 Viewing Statistics for GRE Tunnels ................................................................................. 399
12.7.2 Viewing a List of GRE Tunnels ....................................................................................... 400
12.7.3 Adding a GRE Tunnel .................................................................................................... 401
12.7.4 Configuring a DSCP Marking for GRE Tunnel Traffic ......................................................... 402
12.7.5 Enabling/Disabling Keepalive Messages .......................................................................... 402
12.7.6 Deleting a GRE Tunnel .................................................................................................. 403
12.8 Managing IPsec Tunnels .......................................................................................................... 404
12.8.1 IPsec Tunneling Concepts .............................................................................................. 404
12.8.1.1 IPsec Modes ...................................................................................................... 405
12.8.1.2 Supported Encryption Protocols .......................................................................... 405
12.8.1.3 Public and Secret Key Cryptography .................................................................... 405
12.8.1.4 X509 Certificates ............................................................................................... 406
12.8.1.5 NAT Traversal .................................................................................................... 406
12.8.1.6 Remote IPsec Client Support ............................................................................... 406
12.8.1.7 IPsec and Router Interfaces ................................................................................ 407
12.8.2 Configuring IPsec Tunnels ............................................................................................. 407
12.8.3 Configuring Certificates and Keys .................................................................................. 408
12.8.4 Viewing the IPsec Tunnel Status .................................................................................... 408
12.8.5 Managing Pre-Shared Keys ............................................................................................ 409
12.8.5.1 Viewing a List of Pre-Shared Keys ....................................................................... 410
12.8.5.2 Adding a Pre-Shared Key .................................................................................... 410
12.8.5.3 Deleting a Pre-Shared Key .................................................................................. 410
12.8.6 Managing Connections ................................................................................................. 411
12.8.6.1 Viewing a List of Connections ............................................................................. 411
12.8.6.2 Adding a Connection ......................................................................................... 412
12.8.6.3 Configuring Dead Peer Detection ........................................................................ 413
12.8.6.4 Deleting a Connection ....................................................................................... 414
12.8.6.5 Viewing the Status of a Connection .................................................................... 414
12.8.7 Managing the Internet Key Exchange (IKE) Protocol ........................................................ 415
12.8.7.1 Viewing a List of IKE Algorithms ......................................................................... 415
12.8.7.2 Adding an IKE Algorithm .................................................................................... 416
12.8.7.3 Deleting an IKE Algorithm .................................................................................. 416
12.8.8 Managing the Encapsulated Security Payload (ESP) Protocol ............................................ 417
12.8.8.1 Configuring ESP Encryption ................................................................................ 417
12.8.8.2 Viewing a List of ESP Algorithms ......................................................................... 417
12.8.8.3 Adding an ESP Algorithm ................................................................................... 418
12.8.8.4 Deleting an ESP Algorithm ................................................................................. 418
12.8.9 Configuring the Connection Ends .................................................................................. 419
12.8.10 Managing Private Subnets ........................................................................................... 420
12.8.10.1 Configuring Private Subnets for Connection Ends ............................................... 421
Table of Contents
xxiii