User`s guide
Page 18 of 30 Rel. 3.5 Release Notes
Using Network Extension Mode for ANG-1100 Tunnels Release Notes
Release 3.5 Enhanced Support for VPN Clients
10. Create an IPSec rule. Type ./ipsecRule -a -n ezipsec -s ezipsec 
-w process -b spd -e tunnel -p ezipsec and press 
ENTER.
11.  Type ./ipsecRule -L and press 
ENTER to display and verify the rule was 
added.
12.  Type ./ipsecSpd -n external -r 'gre;ike;ezipsec;pptpIn; 
pptpOut;irppIn;irppOut;https;l2tpIntout’ and press 
ENTER.
This adds the previously created rule to the IPSec Security Policy Database on 
the external interface of the central ANG-3000/7000.
NOTE
If you issue the ipsecDefault command later, these changes will disappear.
13. Type ./ipsecSpd -L and press 
ENTER to display and verify the changes 
were made to the IPSec Security Policy Database.
14. Type SU - root and press 
ENTER. 
15. Type the default password welcome.
16. Change directory to /usr/indus/irc and press 
ENTER. 
17. Issue the ircreboot command to enable the security policy changes and 
press 
ENTER.
Caveats
A central ANG-3000/7000 using Aurorean 3.5 firmware must manage a considerable 
amount of “overhead” for all tunnel traffic to an ANG-1100 using NEM. The 
performance impact of tunnels between these devices may be appreciable if a large 
number of ANG-1100s enable NEM. You should conform to the following guidelines 
to mitigate the impact of this linear search:
! Limit the number of ANG-1100s using NEM to a maximum of 64, or,
! Group remote sites into blocks of 64 (or less) which share a common SPD rule 
on the ANG-3000/7000.










