Nortel BSG8ew 1.0 Configuration Manual page 167

Business services gateway
Table of Contents

Advertisement

Variable definitions
The following table describes the variables and values for configuring VPN IP security.
Variable
Policy Action
Policy Name
Existing Policies
Interface Name
Policy Status
IPSec Gateway IP Address
Traffic Selector table
Local Address
Local Address Mask
Remote Address
Remote Address Mask
Protocol
IPSec SA table
IPSec Mode
Protocol
IPSec Authentication
Value
Select this check box to create a policy action.
Type the IPsec policy name. Each policy must have a unique name.
Select an existing policy for the IPsec policy.
Select the name of the interface for which you want to apply the policy.
Select the status of the IPsec policy. Select one of the following:
INACTIVE - the policy is deleted from the interface.
ACTIVE - the policy is applied on the interface.
Type the security remote endpoint address. All packets are secure up to
this destination.
Type the source IP address of the outbound traffic.
Type the Network mask of the outbound traffic.
Type the destination IP address of the outbound traffic.
Type the destination mask of the outbound traffic.
Select the required traffic protocol for the source and destination address.
Select one of the following options:
Any
TCP
UDP
ICMPv4
AH
ESP
When you select a protocol and apply the IPSec policy, the policy is
applied on the selected protocol packets only. For example, if you select
ICMPv4, when you ping from one host to another, only ICMP packets are
authenticated.
Select the IPSec mode.
If you select Tunnel, IPSec encrypts the IP header and the payload.
If you select Transport, IPSec encrypts only the payload.
Select the authentication protocol.
If you select ESP, IPSec encrypts and authenticates.
If you select AH, IPSec authenticates only.
Select the IPSec authentication method. Select one of the following:
HMAC-MAC5 - the message authentication code is calculated using
the MD5 cryptographic hash function. This cryptographic hash function
has some additional security properties with a 128-bit hash value,
which is commonly used to check the integrity of files.
HMAC-SHA1 - the message authentication code is calculated using
the SHA1 algorithm. This cryptographic hash function computes a
condensed digital representation to a high degree of probability.
VPN advanced configuration
Configuration Guide
167

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bsg12ew 1.0Bsg12tw 1.0Bsg12aw 1.0

Table of Contents