Prestige 652 ADSL Security Router

Figure 24-2 VPN Application .......................................................................................................................

24-3

Figure 24-3 IPSec Architecture.....................................................................................................................

24-4

Figure 24-4 Transport and Tunnel Mode IPSec Encapsulation.....................................................................

24-5

Figure 25-1 VPN SMT Menu Tree ...............................................................................................................

25-1

Figure 25-2 Menu 27 — VPN/IPSec Setup ..................................................................................................

25-2

Figure 25-3 IPSec Summary Fields ..............................................................................................................

25-3

Figure 25-4 Telecommuter’s Prestige Configuration....................................................................................

25-5

Figure 25-5 Headquarters Prestige Configuration ........................................................................................

25-5

Figure 25-6 Menu 27.1 — IPSec Summary..................................................................................................

25-6

Figure 25-7 Menu 27.1.1 — IPSec Setup .....................................................................................................

25-9

Figure 25-8 Two Phases to set up the IPSec SA .........................................................................................

25-13

Figure 25-9 Menu 27.1.1.1 — IKE Setup...................................................................................................

25-15

Figure 25-10 Menu 27.1.1.2 — Manual Setup ...........................................................................................

25-18

Figure 26-1 Menu 27.2 — SA Monitor ........................................................................................................

26-1

Figure 27-1 Example VPN Initiator IPSec Log ............................................................................................

27-1

Figure 27-2 Example VPN Responder IPSec Log........................................................................................

27-2

Figure 28-1 Configuration Text File Format — Column Descriptions.........................................................

28-2

Figure 28-2 Invalid Parameter Entered — Command Line Example...........................................................

28-3

Figure 28-3 Valid Parameter Entered — Command Line Example..............................................................

28-3

Figure 28-4 Internal SPTGEN FTP Download Example..............................................................................

28-3

Figure 28-5 Internal SPTGEN FTP Upload Example...................................................................................

28-4

 

List of Diagrams

Diagram 1 Single-PC per Router Hardware Configuration ..............................................................................

A

Diagram 2 Prestige as a PPPoE Client..............................................................................................................

B

Diagram 3 Virtual Circuit Topology .................................................................................................................

C

Diagram 4 Option to Enter Debug Mode..........................................................................................................

D

List of Figures

xviii