Enterasys Networks Network Card Network Card User Manual


 
RiverMaster Administrators Guide 45
Chapter 3
Tunnel Protocols
Configuring an ANG-3000/7000
6
Click the Authentication tab.
Figure 24 shows the authentication parameters available for each
tunnel protocol.
7
Do one of the following:
Choose IPSec from the Protocol pull down menu.
- Use the information in Table 2 to select the IPSec Signature
Algorithm that determines how IPSec packets exchanged
between the ANG and Aurorean users are signed and
verified.
- Set the Key Lifetimes Time Period and Data Transferred
value. The default values are 60 minutes for Time Period and
Disabled for Data Transferred. Refer to Table 2 to select the
Time Period and Data Transferred values which set how long
the key lifetime should last in terms of time elapsed or
kilobytes amassed.
- Click Apply.
For PPTP, no additional work is required. Unlike IPSec, PPTP
does not authenticate individual packets; instead, PPTP relies on
user authentication using MS-CHAP. After the remote user is
authenticated, all PPTP packets are allowed access.
Figure 24 Tunnel Protocol Authentication Settings
IPSec
PPTP