Siemens RUGGEDCOM ROX II User Manual page 471

Hide thumbs Also See for RUGGEDCOM ROX II:
Table of Contents

Advertisement

RUGGEDCOM ROX II
CLI User Guide
Value
For more information about configuring connection ends, refer to
Connection
g.
Add subnet 192.168.60.0/24 for the right connection end. For more information, refer to
Section 12.8.10.3, "Adding an Address for a Private
h.
Configure the left connection end for the IPsec tunnel with the following public IP address parameters:
Type
Value
For more information about configuring connection ends, refer to
Connection
Add subnet 192.168.50.0/24 for the left connection end. For more information, refer to
i.
Section 12.8.10.3, "Adding an Address for a Private
4.
Enable the IPsec tunnel. For more information, refer to
5.
Verify the tunnel status and make sure the traffic between the two sites is encrypted:
a.
View the IPsec tunnel status and look for a message that includes the connection name and the words
erouted; eroute owner:. For example:
000 "ipsec-12": 192.168.22.0/24===192.168.12.2<192.168.12.2>[C=CA, ST=Ontario, O=RuggedCom,
CN=router2, E=router2@example.com,+S=C]...192.168.12.1<192.168.12.1>[C=CA, ST=Ontari o,
O=RuggedCom, CN=router1, E=router1@example.com,+S=C]===192.168.11.0/24; erouted; eroute owner:
#2
This indicates the IPsec tunnel is active.
For more information, refer to
Capture the packets using Tcpdump on one of the tunnel interfaces. Encrypted traffic will display an ESP
b.
header. For more information about using the Tcpdump utility, refer to
from a Network
Final Configuration Example
The following configuration reflects the topology:
Device A
# show full-configuration
tunnel
ipsec
enabled
preshared-key 2.2.2.2 2.2.2.1
key SiEm3nsRu993dc@m
!
connection test
startup
authenticate
connection-type tunnel
Example: Configuring an Encrypted VPN Tunnel
Parameter
Ends".
Parameter
Ends".
Section 12.8.4, "Viewing the IPsec Tunnel
Interface".
start
secret
2.2.2.2
Section 12.8.9, "Configuring the
Subnet".
address
2.2.2.1
Section 12.8.9, "Configuring the
Subnet".
Section 12.8.2, "Configuring IPsec
Status".
Section 2.4.9, "Capturing Packets
Chapter 12
Tunneling and VPNs
Value
Value
Tunnels".
425

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents