Patton electronic 2800 user manual Managed VPN Router

Page 1

OnSite 2800 Series

Managed VPN Router

User Manual

Important

This is a Class A device and is intended for use in a light industrial environment. It is not intended nor approved for use in an industrial or residential environment.

Sales Office: +1 (301) 975-1000

Technical Support: +1 (301) 975-1007

E-mail:support@patton.com

WWW: www.patton.com

Part Number: 07M2800-GS, Rev. F

Revised: February 22, 2012

Image 1
Contents Managed VPN Router Mailsupport@patton.com Summary Table of Contents Table of Contents Getting started with the OnSite Managed VPN Router VPN configuration LEDs status and monitoring 112 Cabling 124 OnSite 2800 Series factory configuration 132 List of Figures List of Tables Audience About this guideStructure Impaired functioning PrecautionsSafety when working with electricity General observations General conventions Typographical conventions used in this documentGeneral information Chapter contentsOnSite Managed VPN Router 2805 shown OnSite Model 2800 Series overviewOnSite 2800 Series model codes OnSite 2800 Series detailed descriptionDMZ Model code extensions OnSite 2800 Series power input connectorsOnSite 2800 Series rear-panel ports are described in table Ports descriptionsApplications overview Corporate multi-function virtual private network Corporate multi-function virtual private networkGeneral information Hardware installation Create a network diagram see section Network information on Planning the installationInstallation checklist Site log Power sourceNetwork information IP related informationConnecting cables Installing the VPN routerInstalling the Ethernet cable Location and mounting requirementsConnecting an OnSite 2800 Series device to a hub Installing the serial WAN cableDCD Hardware installation Rear panel of 2803K/EUI Rear panel of 2803K/UI Pins not listed are not usedPower connector location on rear panel Connecting to external power sourceUI and EUI power supplies automatically adjust to accept an Getting started with the OnSite Managed VPN Router Introduction Configure IP addressPower connection and default configuration Configure IP addressAll Ethernet interfaces are activated upon power-up Terminal emulation program settings 9600 bps No parity BitSelect the context IP mode to configure an IP interface LoginStop bit No flow control Changing the IP addressConnect the OnSite VPN Router to the network Load configurationRespectively from the host ping Load configuration Serial port configuration Disabling an interface Serial port configuration task listEnabling an interface Example Configuring the serial encapsulation type Configuring the encapsulation for Frame RelayPort Configuring the LMI type Enter Frame Relay modeEntering Frame Relay PVC configuration mode Configuring the keep-alive intervalBinding the Frame Relay PVC to IP interface Configuring the PVC encapsulation typeMode PVC Disabling a Frame Relay PVC Enabling a Frame Relay PVCCRC Displaying serial port informationDlci Displaying Frame Relay informationIntegrated service access Port Configure the serial interface settingsCheck that the Frame Relay settings are correct Configure the introduced PVCsT1/E1 port configuration Enable/Disable T1/E1 port T1/E1 port configuration task listConfiguring T1/E1 port-type Mode port e1t1 slot portConfiguring T1/E1 clock-mode Configuring T1/E1 line-codeConfiguring T1/E1 line-build-out T1 only Configuring T1/E1 framingConfiguring T1/E1 used-connector E1 only Name prt-e1t1 slot/port# framingConfiguring T1/E1 LOS threshold Configuring T1/E1 application modeConfiguring T1/E1 encapsulation Default short-haulConfiguring Channel-Group Timeslots Be used Mode port e1t1 slot portMode channel-group group-name Configuring Channel-Group EncapsulationConfiguring Hdlc Encapsulation Configuring Hdlc CRC-TypeT1/E1 Configuration Examples Default no encapsulationExample 1 Frame Relay without a channel-group Example 3 PPP without a channel-group Example 2 Framerelay with a channel-groupExample 4 PPP with a channel-group VPN configuration Encryption AuthenticationTransport and tunnel modes VPN configuration task listCreating an IPsec transformation profile Creating an IPsec policy profile Procedure To create an IPsec policy profileNodecfg#profile ipsec-policy-man Creating/modifying an outgoing ACL profile for IPsec Displaying IPsec configuration information Configuration of an IP interface and the IP router for IPsecExample Display IPsec policy profiles Example Display IPsec transformation profilesDebugging IPsec Example IPsec Debug OutputOnSite configuration Sample configurationsIPsec tunnel, DES encryption Cisco router configuration Cisco router configuration VPN configuration Access control list configuration What access lists do About access control listsWhy you should configure access lists Features of access control lists When to configure access listsMapping out the goals of the access control list Access control list configuration task listNodepf-acl name#permit ip src src-wildcard any Src-wildcard Where the syntax isType type type type code code cos group Nodepf-acl name#permit icmp src src-wildcard anyNodepf-acl name#deny icmp src src-wildcard Any host src dest dest-wildcard any host destMsg name Where the syntax is as followingCard any host src eq port gt port lt port range Nodepf-acl name#permit tcp udp sctp src src-wildPort lt port range from to cos group cos-rtp group Nodepf-acl name#deny tcp udp sctp src srcGroup-data Where the syntax is Displaying an access control list profile Unbind an access control list profile from an interfaceDebugging an access control list profile Control list profile shall be debugged Denying a specific subnet ExamplesLink scheduler configuration Configuring access control lists Using traffic classes Configuring quality of service QoSApplying scheduling at the bottleneck Introduction to Scheduling Weighted fair queuing WFQPriority Burst tolerant shaping or wfq ShapingHierarchy Quick references Setting the modem rateSome explanations Command cross reference Link scheduler configuration task listPacket classification Defining the access control list profileScenario with Web server regarded as a single source host Creating an access control listNodecfg#profile acl name Creating a service policy profileNodepf-acl name#permit ip host ip-address any traffic-class Nodepf-acl name#permit ip any anyStructure of a Service-Policy Profile Specifying the handling of traffic-classes Defining fair queuing weightDefining the bit-rate Specifying the type-of-service TOS fieldDefining absolute priority Defining the maximum queue lengthSpecifying the precedence field Specifying differentiated services codepoint Dscp markingNodesrc name#set ip tos value Nodesrc name#set ip precedence valueNodesrc name#set ip dscp value Specifying layer 2 markingNodesrc name#set layer2 cos value Discarding Excess Load Defining random early detectionNodesrc name#random-detect burst-tolerance Nodeif-ip if-name#use profile service Devoting the service policy profile to an interfacePolicy name in out Displaying link arbitration status Enable statistics gatheringDisplaying link scheduling profile information Values defining detail of the queuing statistics LEDs status and monitoring Status LEDs Contacting Patton for assistance Contact information Warranty coveragePatton Support Headquarters in the USA Returns for credit Out-of-warranty serviceReturn for credit policy RMA numbersAppendix a Compliance information Compliance SafetyRadio and TV Interference FCC Part CE Declaration of ConformityFCC Part 68 Acta Statement Model 2803 only Authorized European RepresentativeIndustry Canada Notice Model 2803 only Appendix B Specifications Sync serial interface Ethernet interfacesT1/E1 interface Model 2803 only PPP supportDimensions IP servicesManagement Operating environmentInternal power supply 100-240 VAC, 50/60 Hz, 200 mA Power supplyInternal AC version Appendix C Cabling Serial console Connecting a serial terminalEthernet cross-over Ethernet 10Base-T and 100Base-TEthernet straight-through Appendix D Port pin-outs EIA-561 RJ-45 8-pin port RS-232 Console Port Console port, RJ-45, EIA-561 RS-232Sync serial port Ethernet 10Base-T and 100Base-T portEthernet ports are auto-detect MDI-X Serial port21 Female DB-15 connector Appendix E OnSite 2800 Series factory configuration OnSite 2800 Series factory configuration Appendix F Installation checklist Installation checklist
Related manuals
Manual 8 pages 44.23 Kb