Site-To-Site Vpn With Nokia Cryptocluster; Site-To-Site Vpn With Cisco Pix - Nokia IP40 User Manual

Hide thumbs Also See for IP40:
Table of Contents

Advertisement

Windows Gateway to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is
encrypted between the network behind the Windows gateway, and the Nokia IP40 WAN IP
address (network a to Nokia IP40 external IP)
Windows Host to Nokia IP40 Satellite X in Unrestricted mode—in this mode, traffic is
encrypted between the Windows host and the Nokia IP40 internal network (Windows
machine to Network B)
Windows Host to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is
encrypted between the Windows host and the Nokia IP40 WAN IP address (Windows
machine to Nokia IP40 external IP).
For more information on how to configure the Windows 2000 server, see SofaWare's
Configuring Windows 2000/ XP IPSec to Site-to-Site VPN.

Site-to-Site VPN with Nokia CryptoCluster

You can configure for VPN connectivity between the Nokia IP40 Satellite X, and a Nokia VPN
Gateway (CryptoCluster) for site-to-site VPN.
Authentication supported: preshared secret
Perfect Forward Secrecy: supported
The following scenarios are supported:
Nokia VPN Gateway to Nokia IP40 Satellite X in Unrestricted mode—in this mode, traffic
is encrypted between the gateways' subnets (network A to network B).
Nokia VPN Gateway to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is
encrypted between the network behind the Windows gateway and the Nokia IP40 WAN IP
address (network a to Nokia IP40 external IP).
For more information about how to configure the CryptoCluster, see Configuring Nokia
CryptoCluster to Nokia IP40 Site-to-Site VPN.

Site-to-Site VPN with Cisco PIX

You can configure for VPN connectivity between the Nokia IP40 Satellite X and Cisco secure
PIX firewall (using PDM 2.0 and above) for site-to-site VPN.
Authentication supported: preshared secret
The following scenarios are supported:
Cisco PIX Gateway to Nokia IP40 Satellite X in unrestricted mode—in this mode, traffic is
encrypted between the gateways' subnets (network A to network B).
For more information about how to configure CISCO PIX, see Sofaware's Configuring Site-to-
Site VPN with CISCO PIX.
Nokia IP40 Security Platform User's Guide v1.1
Nokia IP40 Tele 8 to Check Point NG AI
195

Advertisement

Table of Contents
loading

Table of Contents