Logs; Diagnostics; Configuring Ssh - Vocality V200 User Manual

Table of Contents

Advertisement

Vocality User Manual
User Manual for V200
Valid for V08_08.02 or V08_48.02
Step 6
Finally, go to ‡Tunnelling Policies > IPSec Tunnel Policy menu (see Figure 5-29 ).
Set SourceAddr to one of your local address names, assigned in Step 4 or 'ANY'.
Set DestAddr to one of your target address names, assigned in Step 5 or 'ANY'.
Set Tunnel to your tunnel SA name, assigned in Step 3 .
Configure your Peer IPSec device to the equivalent settings.

5.10.3 Logs

Messages are generated in the Diagnostics > Slot n > Logs > IP Log when IKE security
associations are created, deleted or fail to establish.

5.10.4 Diagnostics

There is a Diagnostics > Slot n > IP > IPSec SAs menu. This presents a summary of
each security association currently in use on the unit. Each line on the menu represents
a separate SA.
Note: SAs are connectionless entities. Their presence in this table and indeed
statistics showing data usage on outgoing SAs are not an indication that the SA
has been successfully established, particularly for manually-keyed SAs. However,
the presence of IKE SAs in the table is an indication that the SA has been
successfully negotiated with the IKE peer.
Figure 5-32 IPSec SAs diagnostics menu
Refer to the Menus appendix for details of all the parameters that can be set.
5.11

‡Configuring SSH

SSH requires the Security software (RTUSEC)
and a Feature Key on all products.
Page 70 of 114

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents