Overview Of Ipsec Vpn Components - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Configuring IPSec VPN
Figure 38: IPSec VPN Configuration Model
l
Figure notes:
1. ISAKMP Policy
2. IPSEC Transform-set
3. ISAKMP Peer or Peer Group

Overview of IPSec VPN components

The basic IPSec VPN building blocks define how to secure packets, as follows:
ISAKMP policies – define parameters for IKE phase 1 negotiation
Transform-sets – define parameters for IKE phase 2 negotiation
Once the building blocks are defined, IPSec VPN is implemented using a crypto-list. The
crypto-list defines, for the interface to which it applies, which packets should be secured and
how, as follows:
Each rule in the crypto-list points to a crypto-map. A crypto-map points to a transform-set, and
to a peer or peer-group. The peer or peer-group, in turn, point to an ISAKMP policy.
The following diagram illustrates the relationships among the various IPSec VPN components:
362 Administration for the Avaya G250 and Avaya G350 Media Gateways
6
5
4
2
4. Crypto Map
5. crypto-list
6. Interface
3
1

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents