Auto Ipsec Tunnel - Motorola WiNG 5.6 Reference Manual

Access point
Table of Contents

Advertisement

5 - 144 WiNG 5.6 Access Point System Reference Guide

5.2.7.2 Auto IPSec Tunnel

Profile Security Configuration
IPSec tunnels are established to secure traffic, data and management traffic, from access points to remote wireless controllers.
Secure tunnels must be established between access points and the wireless controller with minimum configuration pushed
through DHCP option settings.
1. Select the
Configuration
2. Select Devices.
3. Select
System Profile
4. Expand the
Security
5. Refer to the following table to configure the Auto IPSec Tunnel settings:
Group ID
Authentication Type
Authentication Key
IKE Version
Enable NAT after IPSec
Use Unique ID
Re-Authentication
tab from the Web UI.
from the options on left-hand side of the UI.
menu and select
Auto IPSec
Figure 5-92 Profile Security – Auto IPSec Tunnel screen
Configure the ID string used for IKE authentication. String length can be between 1 - 64
characters.
Set the IPSec Authentication Type. Options include PSK (Pre Shared Key) or rsa.
Set the common key for authentication between the remote tunnel peer. Key length is
between 8 - 21 characters.
Configure the IKE version to use. The available options are ikev1-main, ikev1-aggr and
ikev2.
Select this option to enable NAT after IPSec. Enable this option if there are NATted
networks behind VPN tunnels.
In scenarios where different access points behind different NAT boxes/routers have the
same IP address, it is not possible to create a tunnel between the wireless controller
and access point, as the wireless controller fails to identify the access point uniquely.
When selected, each access point behind the same NAT box/router will have a unique
ID. This unique ID is used to create the VPN tunnel.
Select this option to re-authenticate the key on a IKE rekey. This setting is disabled by
default.
Tunnel.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents