Patton electronic 2800 Network Router User Manual


 
6
OnSite 2800 Series User Manual Table of Contents
Configuring Channel-Group Timeslots ..........................................................................................................63
Configuring Channel-Group Encapsulation ...................................................................................................63
Entering HDLC Configuration Mode ............................................................................................................63
Configuring HDLC CRC-Type .....................................................................................................................64
Configuring HDLC Encapsulation .................................................................................................................64
T1/E1 Configuration Examples ......................................................................................................................64
Example 1: Frame Relay without a channel-group ....................................................................................65
Example 2: Framerelay with a channel-group ............................................................................................66
Example 3: PPP without a channel-group .................................................................................................66
Example 4: PPP with a channel-group ......................................................................................................66
6 VPN configuration ........................................................................................................................................ 67
Introduction..........................................................................................................................................................68
Authentication ................................................................................................................................................68
Encryption ......................................................................................................................................................68
Transport and tunnel modes ...........................................................................................................................69
VPN configuration task list ...................................................................................................................................69
Creating an IPsec transformation profile .........................................................................................................69
Creating an IPsec policy profile .......................................................................................................................70
Creating/modifying an outgoing ACL profile for IPsec ...................................................................................72
Configuration of an IP interface and the IP router for IPsec ............................................................................73
Displaying IPsec configuration information ....................................................................................................73
Debugging IPsec .............................................................................................................................................74
Sample configurations ...........................................................................................................................................75
IPsec tunnel, DES encryption .........................................................................................................................75
OnSite configuration .................................................................................................................................75
Cisco router configuration ........................................................................................................................76
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ....................76
OnSite configuration .................................................................................................................................76
Cisco router configuration ........................................................................................................................77
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96 ..................77
OnSite configuration .................................................................................................................................77
Cisco router configuration ........................................................................................................................77
7 Access control list configuration.................................................................................................................... 79
Introduction..........................................................................................................................................................80
About access control lists .......................................................................................................................................80
What access lists do .........................................................................................................................................80
Why you should configure access lists .............................................................................................................80
When to configure access lists .........................................................................................................................81
Features of access control lists .........................................................................................................................81
Access control list configuration task list................................................................................................................82
Mapping out the goals of the access control list ...............................................................................................82
Creating an access control list profile and enter configuration mode ...............................................................83
Adding a filter rule to the current access control list profile .............................................................................83