Log:
Assessments - 2, GPA: 4 ( )

Instruções de Operação Compatible Systems, Modelo INTRAPORT 2+

Fabricante : Compatible Systems
Arquivo Tamanho: 293.11 kb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



Facilidade de uso


C. Click OK. You may repeat Step 8 as needed to add all users. 9. Save the configuration to a file and download to the device. A. From the File menu choose Save To > File. This will bring up a file save dialog box. Name the device configuration file, making sure that you associate the file name with the IntraPort 2/2+ and can find the file later. B. From the File menu choose Save To > Device. This will bring up a download configuration dialog window. Choose the IntraPort 2/2+ if given the option. When asked if you are sure that you want to download the configuration and restart the device, click on the Yes button. You should see a new window with a log of the download process. CompatiView will then tell you that the download is complete and the device is rebooting. Do not turn the IntraPort 2/2+ off during the boot process. After the IntraPort has rebooted, users will be able to connect with the VPN Client software. Chapter 6 - Basic Configuration Guide Configuring the Server for LAN-to-LAN Tunnels This section configures VPN tunnel parameters and defines a virtual port for LAN-to-LAN tunnel traffic. It assumes that you have already assigned IP addresses to the Ethernet interface(s), and set up static routes, as shown in VPN Client Tunnel Settings. • Note: VPN Ports are only used for LAN-to-LAN tunnels. VPN Client tunnels do not use VPN Ports. LAN-to-LAN tunneling requires that you set parameters for a VPN port on each end of a tunnel, so you must repeat the following steps on the remote end. 1. Add a VPN Port A. From the File menu, choose VPN Port> Add VPN Port. This will bring up the Add VPN Port dialog box and will allow you to select a number for the virtual port. Add VPN Port B. Click OK 2. Set up the Tunnel Partner Once you have created a VPN port, you need to provide information about the remote Tunnel Partner and specify which interface on the local device will act as the endpoint for the tunnel. A. In the Device View, click on the VPN port icon that was added in the previous step, and select Tunnel Partner. This will open the Tunnel Partner: VPN (#) dialog box. Tunnel Partner: VPN (#) B. Enter the Partner Address. This is the IP address of the remote Tunnel Partner with which this VPN port will communicate via the tunnel. This will be an interface on the remote router which has been set to route IP and will also be the remote VPN port’s Bind To interface. Chapter 6 - Basic Configuration Guide C. If you are using both Ethernet ports, then the Bind To interface should be set to Ethernet 1. For single Ethernet setups, it should be Ethernet 0. This specifies which interface on this device will act as the end point for the tunnels defined by this configuration. Packets sent from this device to the remote Tunnel Partner will use this interface’s IP address as a source address. D. Click OK. 3. Set up Key Management These settings control how the local Tunnel Partner will identify and authenticate the remote Tunnel Partner. IKE Key Management is recommended. IKE Key Management Once a VPN port has been created, you may access the IKE Key Management dialog box by clicking on the port’s icon in the Device View and selecting IKE Key Management. A. From the pull-down menu, select the Key Manage method to use for this tunnel. If Auto key management is selected, IKE will be used to allow two devices to negotiate between themselves which encryption and authentication methods will be used for the tunnel. If Manual is selected, this Tunnel Partner will not use IKE, and the tunnel’s encryption and authentication parameters must be manually set in the Manual Key Management dialog box, which is not described in this guide. If Initiate is selected, this Tunnel Partner will use IKE, but Chapter 6 - Basic Configuration Guide will only initiate tunnel establishment attempts and will not respond to them. If Respond is selected, this Tunnel Partner will use IKE, but will only respond to tunnel establishment attempts and will not initiate them. B. Enter the Shared Key. This is a shared alphanumeric secret that is used to generate session keys. C. Select the authentication and encryption algorithms to be used for tunnel sessions using the IKE Configuration Transform list box. Click on the Add... button in the Transform section to access the IKE Configuration Transform List dialog box. IKE Configuration Transform List The default settings of MD5 for Authentication and DES for Encryption are adequate for most setups. Click OK. D. In the IKE Key Management dialog box, you may click on the PFS checkbox to add additional security parameters during tunnel sessions. (This is optional.) • Note: For more information regarding encryption, authentication, and Perfect Forward Secrecy, refer to the CompatiView Management Software Reference Guide. E. Click OK. Chapter 6 - Basic Configuration Guide 4. Save the configuration to a file and download to the device. A. From the File menu choose Save To > File. This will bring up a file save dialo...

Este manual também é adequado para os modelos :
Home theater - INTRAPORT 2 (293.11 kb)

Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias