Chapter 3

Tunnel Protocols

Configuring an ANG-3000/7000

 

6Click the Authentication tab.

Figure 24 shows the authentication parameters available for each tunnel protocol.

7Do one of the following:

Choose IPSec from the Protocol pull down menu.

-Use the information in Table 2 to select the IPSec Signature Algorithm that determines how IPSec packets exchanged between the ANG and Aurorean users are signed and verified.

-Set the Key Lifetimes Time Period and Data Transferred value. The default values are 60 minutes for Time Period and Disabled for Data Transferred. Refer to Table 2 to select the Time Period and Data Transferred values which set how long the key lifetime should last in terms of time elapsed or kilobytes amassed.

-Click Apply.

For PPTP, no additional work is required. Unlike IPSec, PPTP does not authenticate individual packets; instead, PPTP relies on user authentication using MS-CHAP. After the remote user is authenticated, all PPTP packets are allowed access.

IPSec

PPTP

Figure 24 Tunnel Protocol Authentication Settings

RiverMaster Administrator’s Guide

45

Page 57
Image 57
Enterasys Networks Network Card manual Click the Authentication tab, Tunnel Protocol Authentication Settings