Appendix B

Configuring Tunnel Protocols

ANG-3000/7000 Preconfiguration Stored on a Floppy Disk

2Click on the Authentication tab.

Figure 124 shows the authentication parameters available for each tunnel protocol.

3Do one of the following:

Choose IPSec from the Protocol pull down menu.

-Use the information in Table 18 to select the IPSec Signature Algorithm that determines how IPSec packets exchanged between the ANG and Aurorean users are signed and verified.

-Use Table 18 to select the Time Period and Data Transferred values which set how long the key lifetime should last in terms of time elapsed or kilobytes amassed.

-Click Apply.

For PPTP, no additional work is required. Unlike IPSec, PPTP does not authenticate individual packets; instead, PPTP relies on user authentication using MS-CHAP. After the remote user is authenticated, all PPTP packets are allowed access.

IPSec

PPTP

Figure 124 Tunnel Protocol Authentication Window

RiverMaster Administrator’s Guide

223

Page 235
Image 235
Enterasys Networks Network Card manual Click on the Authentication tab, 223