6-54 WS5100 Series Switch System Reference Guide
7. To add a new range of IP addresses, click the
in the fields provided. Click
8. Click
Cancel
6.8.3 Configuring IPSEC VPN Authentication
If IKE is not used for establishing security associations, there is no negotiation of security associations.
Consequently, the configuration information in both systems must be the same for traffic to be processed
successfully by the IPSec resource. Select the
mechanisms used with the IPSEC VPN configuration.
To define the IPSEc VPN authentication configuration:
1. Select
Security
2. Select the
Authentication
3. Define whether IPSec VPN user authentication is conducted using a Radius Server (by selecting the
Radius
radio button), by a user-defined set of names and password (by selecting the
OK
when completed to save the changes.
to disregard the changes and revert to the last saved configuration.
>
IPSec VPN
from the main menu tree.
tab.
Add
button (within the IP Range tab) and define the range
Authentication
tab to define the credential verification
User Table
radio