USER’S GUIDE

Configuring Encryption 231

Configuration 231

Configuring an Encryption adapter 231

Configuring Security Associations and Authentication (IP Security Only) 232 Configuring Link Layer Encryption (PPP Encryption Only) 233 Encryption Configuration Elements 234

Encryption Background Information 236

IP Network Layer Encryption 236

ESP Implementation 236 IP Encryption Example 237 Authentication Headers 237

Link Layer Encryption 238

Link Layer Encryption: Manually-Configured Keys 238 Automated Key Exchange 239

Interaction with Other Features 239 IP Filters 239

Multiple MAC/IP Addresses 240 PPP Compression 240

ADVANCED CONFIGURATION 241

Configuring Alternate Accesses 242

Overview 242

Dedicated Accesses 242

Configuring a Dedicated Access 242

Dedicated Access Configuration Elements 243

Dedicated Access Background Information 243

X.25 Accesses 244

Configuring an X.25 Access 244

Basic Configuration Information 244

LAPB Configuration Information 245

X.25 Configuration Information 245

Permanent Virtual Circuit Information 247

X.25 Configuration Elements 247

X.25 Line Configuration Elements 247

LAPB Configuration Elements 248

X.25 Access Configuration Elements 249

PVC Configuration Elements 252

X.25 Access Background Information 253

Current X.25 Restrictions 255

Frame Relay Accesses 255

Configuring a Frame Relay Access 255

Configuring General Access Information 255

Configuring a PVC 256

Frame Relay General Configuration Elements 257

Frame Relay PVC Configuration Elements 258

Frame Relay Access Background Information 260

The Local Management Interface Overview 261

Data Rate Control Overview 261

Congestion Control Overview 262

Current Restrictions 262

12 CyberSWITCH

Page 12
Image 12
Enterasys Networks CSX5500, CSX6000, CSX7000 manual Configuring Encryption