Siemens RX1500 User Manual page 22

Ruggedcom rox ii series
Hide thumbs Also See for RX1500:
Table of Contents

Advertisement

Table of Contents
5.28.1.5 NAT Traversal ................................................................................................... 614
5.28.1.6 Remote IPsec Client Support ............................................................................. 615
5.28.1.7 IPsec and Router Interfaces ............................................................................... 615
5.28.2 Configuring IPsec Tunnels ............................................................................................ 615
5.28.3 Configuring Certificates and Keys ................................................................................. 616
5.28.4 Viewing the IPsec Tunnel Status ................................................................................... 617
5.28.5 Managing Pre-Shared Keys .......................................................................................... 618
5.28.5.1 Viewing a List of Pre-Shared Keys ..................................................................... 618
5.28.5.2 Adding a Pre-Shared Key .................................................................................. 618
5.28.5.3 Deleting a Pre-Shared Key ................................................................................ 620
5.28.6 Managing Connections ................................................................................................. 620
5.28.6.1 Viewing a List of Connections ............................................................................ 621
5.28.6.2 Adding a Connection ......................................................................................... 621
5.28.6.3 Configuring Dead Peer Detection ....................................................................... 624
5.28.6.4 Deleting a Connection ....................................................................................... 625
5.28.7 Managing the Internet Key Exchange (IKE) Protocol ...................................................... 626
5.28.7.1 Viewing a List of IKE Algorithms ........................................................................ 626
5.28.7.2 Adding an IKE Algorithm ................................................................................... 626
5.28.7.3 Deleting an IKE Algorithm .................................................................................. 627
5.28.8 Managing the Encapsulated Security Payload (ESP) Protocol ......................................... 628
5.28.8.1 Configuring ESP Encryption ............................................................................... 628
5.28.8.2 Viewing a List of ESP Algorithms ....................................................................... 629
5.28.8.3 Adding ESP Algorithms ..................................................................................... 630
5.28.8.4 Deleting ESP Algorithms ................................................................................... 630
5.28.9 Configuring the Connection Ends .................................................................................. 631
5.28.10 Managing Private Subnets .......................................................................................... 634
5.28.10.1 Configuring Private Subnets for Connection Ends .............................................. 635
5.28.10.2 Viewing a List of Addresses for Private Subnets ................................................ 635
5.28.10.3 Adding an Address for a Private Subnet ........................................................... 636
5.28.10.4 Deleting an Address for a Private Subnet .......................................................... 637
5.29 Managing Layer 2 Tunnels ...................................................................................................... 637
5.29.1 Viewing the Round Trip Time Statistics ......................................................................... 638
5.29.2 Configuring L2TP Tunnels ............................................................................................ 638
5.29.3 Configuring L2TPv3 Tunnels ......................................................................................... 641
5.29.4 Configuring the Layer 2 Tunnel Daemon ....................................................................... 647
5.29.5 Managing GOOSE Tunnels .......................................................................................... 648
5.29.5.1 Viewing the GOOSE Tunnel Statistics ................................................................ 649
5.29.5.2 Viewing a List of GOOSE Tunnels ...................................................................... 649
5.29.5.3 Adding a GOOSE Tunnel .................................................................................. 649
5.29.5.4 Deleting a GOOSE Tunnel ................................................................................. 651
xxii
RUGGEDCOM ROX II
User Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rx1501Rx1510Rx1511Rx1512

Table of Contents