Enterasys-networks Security Router X-PeditionTM Manual de usuario Pagina 342

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 341
VPN Configuration Overview
14-20 Configuring the Virtual Private Network
Authentication, Authorization, and Accounting (AAA) support including AAA per interface
(for clients), AAA for PPP, and AAA debugging
Dynamic Host Configuration Protocol (DHCP) support
–DHCP Server
•OSPF over VPN
DF Bit override on IPSec tunnels
Copy TOS byte support (refer to“Configuring Quality of Service” on page 12-1 for a
configuration examples)
QoS on VPN (refer to“Configuring Quality of Service” on page 12-1 for more information)
VPN Configuration Overview
IPSec configuration entails the following basic steps. First, decide what type of VPN you want to
configure from the following choices:
Site-to-Site (Peer-to-Peer) using either pre-shared key or digital certificate (PKI) authentication
EZ-IPSec using Client or Network Extension mode
Remote Access using either L2TP/IPSec or PPTP
Consider that in Site-to-Site applications, the XSR can act as a gateway, or terminator, of tunnels
and also as the client, or initiator, of tunnels. In Remote Access applications, the router can only act
as a server.
Next, perform the following:
Generate a master encryption key once on the XSR.
Define ACLs to specify the type of traffic to be secured.
Specify policies - IKE and IPSec transform-sets spell out authentication, encryption, data
integrity, policy lifetime, and other values when negotiating Security Associations (SAs) with
IPSec peers.
Create a Security Policy Database (SPD) by configuring crypto maps, transform-sets, and ACLs.
Configure authentication via AAA and/or PKI.
Set up optional auxiliary functions including RADIUS, IP address assignment, and NAT.
Configure a VPN interface, if required.
Master Encryption Key Generation
The XSR stores sensitive data such as user names, passwords, and certificates in Flash: directory
files. Retaining this data in the clear would pose a security risk, so the XSR uses the master
encryption key to encode it. The XSR is not supplied with a master encryption key at the factory -
you must manually generate it before configuring VPN. To do so:
Vista de pagina 341
1 2 ... 337 338 339 340 341 342 343 344 345 346 347 ... 465 466

Comentarios a estos manuales

Sin comentarios