Avocent Network Adapter EMS1000P Guía de usuario Pagina 36

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 80
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 35
IPSec(VPN)
Virtual Private Network (VPN) enables a secure communication between the console server and a remote
network by utilizing a gateway and creating a secured connection between the console server and the gateway.
The IPSec protocol is used to construct the secure tunnel and provides encryption and authentication services at
the IP level of the protocol stack.
NOTE: IPSec(VPN) is not supported with IPv6.
When Network - IPSec(VPN) is selected, the IPSec(VPN) screen is displayed.
Use the Add button to add a VPN connection or click on an existing connection name to edit one already in the
list. Click the Delete button to delete an existing connection. If NAT settings need to be changed, click the
Configure NAT button.
When you click the Add button, the IPSec(VPN) - Add screen is displayed.
NOTE: To run IPSec (VPN), you must enable IPSec under the custom Security Profile.
The remote gateway is referred to as the remote or right host and the console server is referred to as the local or
left host. If left and right are not directly connected, then you must also specify a NextHop IP address.
The next hop for the remote or right host is the IP address of the router to which the remote host or gateway
running IPSec sends packets when delivering them to the left host. The next hop for the left host is the IP
address of the router to which the console server sends packets to for delivery to the right host.
A Fully Qualified Domain Name should be indicated in the ID fields for both the Local (Left) host and the
Remote (Right) host where the IPSec negotiation takes place.
The following table describes the fields and options on the IPSec(VPN) - Add screen. The information must
match exactly on both ends for local and remote.
Field Name Definition
Connection
Name
Any descriptive name you wish to use to identify this connection.
Authentication
Protocol
The authentication protocol used, either ESP (Encapsulating Security Payload) or AH (Authentication
Header).
Boot Action The boot action configured for the host, either
Ignore
,
Add
or
Start
.
Authentication
Method
Authentication method used, either RSA Public Keys or Shared Secret.
Remote
(Right) Side -
and - Local
(Left) Side
Enter the required address or text for each of the four fields for both Remote Side and Local Side: ID: This
is the hostname that a local system and a remote system use for IPSec negotiation and authentication. It
can be a fully qualified domain name preceded by @. For example, hostnam[email protected] IP Address:
The IP address of the host. NextHop: The router through which the console server (on the left side) or the
remote host (on the right side) sends packets to the host on the other side. SubNet: The netmask of the
subnetwork where the host resides. Use CIDR notation. The IP number followed by a slash and the
number of ‘one’ bits in the binary notation of the netmask. For example, 192.168.0.0/24 indicates an IP
address where the first 24 bits are used as the network address. This is the same as 255.255.255.0.
RSA Key (If
RSA Key
is
selected)
For IPSec(VPN) authentication, you need to generate a public key for the console server and find out the
key used on the remote gateway. Copy and paste for copying the RSA key from another source is
supported.
Table 3.4: Field and Menu Options for Configuring IPSec(VPN)
28 Cyclades™ ACS 6000 Advanced Console Server
Vista de pagina 35
1 2 ... 31 32 33 34 35 36 37 38 39 40 41 ... 79 80

Comentarios a estos manuales

Sin comentarios