Cyclades User's Guide manual Edit or complete the appropriate fields as follows

Models: User's Guide

1 506
Download 506 pages 21.21 Kb
Page 268
Image 268

Configuration

Note: If the selected authentication method is RSA Public Keys, the dialog box on the left of the previous figure is used; if the authentication method is Shared Secret, the dialog box on the right is used.

3.Edit or complete the appropriate fields as follows.

Field Name

Definition

 

 

Connector Name

Any descriptive name you want to use to

 

identify this connection such as

 

“MYCOMPANYDOMAIN-VPN.”

Authentication

Protocol

Authentication Method

ID

IP Address

NextHop

The authentication protocol used, either “ESP” (Encapsulating Security Payload) or “AH” (Authentication Header).

Authentication method used to establish a VPN connection, either “RSA Public Keys” or “Shared Secret.”

This is the hostname that a local system and a remote system use for IPSec negotiation and authentication.

It can be a Fully Qualified Domain Name preceded by @. For example, hostname@xyz.com

The IP address of the host.

The router through which the KVM/net (on the left side) or the remote host (on the right side) sends packets to the host on the other side.

252

AlterPath KVM/net Installation, Administration, and User’s Guide

Page 268
Image 268
Cyclades User's Guide manual Edit or complete the appropriate fields as follows, Any descriptive name you want to use to