Download Print this page

Defining The Ipsec Vpn Remote Configuration - Extreme Networks Summit WM3000 Series Reference Manual

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
AH Authentication
Scheme
ESP Encryption
Scheme
ESP Authentication
Scheme
Mode
5 Refer to the Status field for the current state of the requests made from applet. This field displays
error messages if something goes wrong in the transaction between the applet and the controller.
6 Click OK to use the changes to the running configuration and close the dialog.
7 Click Cancel to close the dialog without committing updates to the running configuration.

Defining the IPSec VPN Remote Configuration

Use the IPSec VPN Remote tab to configure the DNS and/or WINS Servers used to route packets to the
remote end of the IPSec VPN tunnel. The Remote tab is also used for defining the IP address range used
within the IPSec VPN tunnel and configuring the authentication scheme for user permissions within the
IPSec VPN tunnel.
To define the IPSEc VPN's remote configuration:
1 Select Security > IPSec VPN from the main menu tree.
2 Click the Remote tab.
380
Use AH
Select the
checkbox to define the AH Transform Authentication
scheme. Options include:
None
- No AH authentication is used.
AH-MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
AH-SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
Use ESP
Select the
checkbox to define the ESP Encryption Scheme.
Options include:
None
- No ESP encryption is used with the transform set.
ESP-DES
- ESP with the 56-bit DES encryption algorithm.
ESP-3DES
- ESP with 3DES, ESP with AES.
ESP-AES
- ESP with 3DES, ESP with AES (128 bit key).
ESP-AES 192
- ESP with 3DES, ESP with AES (192 bit key).
ESP-AES 256
- ESP with 3DES, ESP with AES (256 bit key).
Use ESP
Select the
checkbox to define the ESP Authentication Scheme.
Options include:
None
- No ESP authentication is used with the transform set.
MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
Define the current mode used with the transform set. The mode is either
Tunnel or Transport.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700