Compatible Systems manual Introduction, About the IntraPort 2/2+ VPN Access Server

Page 7

Chapter 1 - Introduction

1

Chapter 1 - Introduction

About the IntraPort 2/2+ VPN Access Server

Congratulations on your purchase of the IntraPort 2 or IntraPort 2+ VPN Access Server. These VPN Access Servers provide secure Internet-based remote access and site-to-site connections.

The IntraPort 2 will support up to 16 simultaneous LAN-to-LAN connections and up to 64 simultaneous remote client connections. The IntraPort 2+ will support up to 32 simultaneous LAN-to-LAN connec- tions and up to 500 simultaneous remote client connections.

A Note About Remote Client Connections

In order to create a tunnel to a network over the Internet, remote users must run VPN Client software on a Windows95/98 PC, Windows NT PC, Mac OS, Linux, or Solaris computer which is connected to the Internet via PPP or Ethernet.

The IntraPort VPN Clients are applications which set up the remote access VPN tunnels to the IntraPort 2/2+ VPN Access Server and make sure that appropriate data gets sent.

The clients work in conjunction with your communications software. Connections can be made to the Internet via PPP software or over a local intranet via your workstation’s LAN adapter. Together, these pieces provide cost-effective on-demand connections to your corpo- rate network.

IntraPort 2/2+ VPN Access Server Installa- tion Overview

This manual will help you install either the IntraPort 2 or the IntraPort 2+ VPN Access Server on your Local Area Network. For an overview on installing and running the VPN Client software at remote user loca- tions, refer to the VPN Client Reference Guide. For the most up-to-date information available on Compatible Systems products, please visit the Technical Support section of our Web site at: http://www.compatible.com.

Image 7
Contents Page Page Getting Started Network InstallationGetting Help with the IntraPort 2/2+ VPN Access Server IntroductionAppendix a Shipping Defaults Basic Configuration GuideParameters Pin Outs for DB-25 Male to DB-25 Female RS-232 Data InformationSystems Appendix F Terms and ConditionsPage Introduction About the IntraPort 2/2+ VPN Access ServerIntraPort 2/2+ VPN Access Server Installa- tion Overview IntroductionBasic Configuration Guide Network InstallationCompatiView Software Installation Command Line PreparationAppendices Introduction Alternate Protocols and Security ParametersPage Few Notes Warranty and ServiceGetting Help with the IntraPort 2/2+ VPN Access Server Getting StartedNeeded for Installation Supplied with the IntraPort 2/2+ VPN Access ServerWhat You Will Need To Get Started VPN Client Software Requirements Ethernet Connection RequirementsPage Connecting the Server to the Ethernet Network InstallationPlacing the Server Powering Up the Server Connecting a Management ConsoleSystem Requirements CompatiView for WindowsTransport Protocols and CompatiView Installation and OperationCompatiView Software Installation Page Out-of-Band Command Line Management Command Line ManagementSetting Up Telnet Operation Temporarily Reconfiguring a Host for Command Line ManagementIP Ethernet 0 section Page Setup Options Basic Configuration GuideDiagram of Dual-Ethernet Setup Diagram of Dual-Ethernet SetupDiagram of Single Ethernet Setup Diagram of Single-Ethernet SetupVPN Client Tunnel Settings Configuration Using CompatiViewTurn off AppleTalk and IPX optional Dual Ethernet Single Ethernet TCP/IP Routing Ethernet Single Ethernet Turn IP off on Ethernet Dual Ethernet Set basic IP parameters for EthernetIP Connection Ethernet IP Static Routes Basic Configuration Guide Set an IP Gateway for EthernetDual Ethernet Static Route Single Ethernet Static Route Basic Configuration Guide IPSec Gateway Basic Configuration Guide Set an IPSec GatewayIKE Policy Set an IKE PolicyVPN Group Configuration General Tab Basic Configuration Guide Set up VPN Group ConfigurationsVPN Group Configuration IKE Configuration Tab IKE Configuration Transform List Basic Configuration Guide Basic Configuration Guide VPN Group Configuration IPX Connection Tab VPN User Configuration Basic Configuration Guide Set up VPN UsersVPN User Save the configuration to a file and download to the device Tunnel Partner VPN # Set up the Tunnel PartnerAdd a VPN Port Add VPN PortIKE Key Management Set up Key ManagementIKE Configuration Transform List Save the configuration to a file and download to the device Example Basic Configuration Using Command LineSingle Ethernet Setup Example Edit IP Static Append Configure general Basic Configuration Guide Set up VPN Group Configurations Configure vpn group basic vpn config Save the Configuration and download it to the device Use the configure command to add a VPN Port Configure tunnel partner vpn Required for IPX IPX ProtocolSuggested for IPX Required for AppleTalk Setting up Radius AuthenticationSetting the IntraPort for a Radius Server AppleTalk ProtocolRadius Server User Authentication Settings Setting up SecurID Authentication ACE/Server Settings Setting the IntraPort for an ACE/ServerSaving a Configuration File to Flash ROM Page Ethernet Interfaces Appendix a Shipping DefaultsAppendix B Connector and Cable Pin Outs Appendix B Connector and Cable Pin OutsAppendix C Security Dynamics ACE/Server Information Page IntraPort 2/2+ VPN Access Servers LED Patterns IntraPort 2 Connections/Users LEDs Appendix D LED Patterns and Test Switch SettingsIntraPort 2+ Connections/Users LEDs IntraPort 2 Special Indicators IntraPort 2/2+ VPN Access Server Switch SettingsIntraPort 2+ Special Indicators Page Compatible Systems WWW Server Appendix E Downloading Software From Compatible SystemsPage Appendix F Terms and Conditions Appendix F Terms ConditionsPage Appendix F Terms and Conditions

2+, 2 specifications

Compatible Systems 2,2+ is a cutting-edge framework designed to enhance interoperability and compatibility across various technological platforms and systems. Built on a robust foundation, this system aims to simplify the integration of old and new technologies, ensuring organizations can effectively leverage their existing infrastructures while embracing innovations.

One of the primary features of Compatible Systems 2,2+ is its modular architecture. This design allows organizations to implement only the components they need, significantly reducing costs and complexities associated with full-scale system overhauls. It promotes flexibility, enabling businesses to customize solutions according to their specific operational requirements without compromising performance or security.

Another standout characteristic is its adherence to open standards. By supporting widely accepted protocols and formats, Compatible Systems 2,2+ significantly reduces the barriers to integration. This feature facilitates communication between different systems and devices, enabling seamless data exchange and promoting collaboration across varied platforms. Organizations can easily connect disparate systems, fostering a unified operational environment.

The introduction of advanced connectivity features, such as API management and microservices architecture, distinguishes Compatible Systems 2,2+ from traditional systems. This technology allows for more granular control over data flows and interactions, enhancing agility in development and deployment. Organizations can quickly adapt to changing market demands, ensuring they remain competitive in a fast-paced digital landscape.

Security is another critical concern addressed by Compatible Systems 2,2+. The framework incorporates robust security protocols to safeguard data integrity and protect against unauthorized access. With features such as encryption, authentication, and authorization mechanisms, organizations can trust that their sensitive information is well-protected.

Moreover, Compatible Systems 2,2+ includes comprehensive support for analytics and monitoring. By integrating data analytics tools, this system allows organizations to gain insights into system performance and user behavior, facilitating informed decision-making. This capability not only enhances operational efficiency but also aids in predictive maintenance, reducing downtime and improving overall productivity.

In conclusion, Compatible Systems 2,2+ presents a versatile and secure solution for organizations looking to enhance compatibility and interoperability across their technological ecosystems. With its modular architecture, support for open standards, advanced connectivity features, and robust security measures, it stands as a leading choice for businesses aiming to navigate the complexities of modern technology integration successfully. Embracing Compatible Systems 2,2+ can empower organizations to innovate while preserving their valuable technological investments.