Viewing Or Modifying An Ipsec Server Table Entry; Deleting An Ipsec Server Table Entry; Radius Configuration; Current Status Of Radius Authentication - EMS 2000 IDU Series User Manual

Table of Contents

Advertisement

4.2.2 Viewing or Modifying an IPSec Server Table Entry

4.2.3 Deleting an IPSec Server Table Entry

4.3

RADIUS Configuration

4.3.1 Current Status of RADIUS Authentication

Series 2000/3000 IDU User's Manual
Revision P4
To view or modify an IPSec server table entry, choose the entry from the IPSec Server
Table Configuration drop-down box. The table below describes the parameters that can be
viewed or modified.
Parameter
The IP address of the primary IPSec server.
Upon initially receiving host traffic, the IDU will attempt to establish a
tunnel with the primary IPSec server. In the event where the primary
IPSec Server IP
IPSec server does not respond, the IDU will then attempt to negotiate
Address
with the backup IPSec server (see below).
This parameter is set during initial configuration of the IDU (see the
Installation Manual,
The IP address of the Backup IPSec server.
IPSec Backup Server
This parameter is set during initial configuration of the IDU (see the
IP Address
Installation Manual,
When the connection with the primary IPSec server fails, the IDU will
IPSec Roll-Over
try to connect to the backup IPSec server when the roll-over time
Time
elapses.
If the SIT IPSec re-key timeout expires, the SIT will re-negotiate the
IPSec Re-key Time
key.
To enable this IPSEC server connection, the status must be "Active".
IPSec Server Status
This parameter is set during initial configuration of the IDU (see the
Installation Manual,
Table 4.1 IPSec Configuration Parameters
When you have finished modifying these parameters, click Save This IPSec Server
Table Entry at the bottom of the page. This opens the Superuser Menu Result page,
enabling you to reboot the IDU and implement the modifications (see
To delete an IPSec server table entry, choose the entry from the IPSec Server Table Con-
figuration drop-down box. Next, click Delete This IPSec Server Table Entry.
The IDU implements RADIUS authentication with a RADIUS server at the hub. If the
RADIUS Flag is set, the IDU must authenticate with the RADIUS server before it can use
the satellite network to send and receive traffic data.
To check the current status of the SIT's RADIUS authentication, open the IDU Monitoring
page and check the Authentication State parameter (see
• Not Enabled. RADIUS authentication is disabled for the SIT (see below).
Page 33
Table 10:
Description
section
3.6).
section
3.6).
section
3.6).
section
Appendix
B).
3.1).

Advertisement

Table of Contents
loading

This manual is also suitable for:

3000 idu series

Table of Contents