Specifications
Explorers Nur für den internen Gebrauch
A31003-H3580-M103-2-76A9, 01-2009
7-70 HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
hg-07.fm
Security
Double-click Tunnels in the tree structure to display the following entries:
> Active Tunnels
> Configured Tunnels
You can use the Active Tunnels function to view which services are active and which settings
are enabled for these services.
You can use the Configured Tunnels function to configure, edit, and delete tunnels.
7.2.5.48 Active Tunnels
Active tunnels become configured tunnels when the configuration is enabled – see Section
7.2.5.2, "Activate the Configured VPN Tables".
WBM path:
WBM > Explorers > Security > (double-click) VPN > (double-click) Tunnels > Active Tunnels
Right-click Active Tunnels to display a menu containing the following entry:
> Displaying general tunnel data
Active Tunnels (folder):
If configured tunnels (see Section 7.2.5.51, "Configured Tunnels") were activated by activating
the configuration (see Section 7.2.5.2, "Activate the Configured VPN Tables"), Active Tunnels
is displayed as a folder icon. In this case, double-click Active Tunnels in the tree structure to
view the activated tunnels. Right-click an individual tunnel to display a menu containing the fol-
lowing entries:
> Displaying tunnel data
7.2.5.49 Displaying general tunnel data
You can view a list of all active tunnels containing detailed information in a table.
WBM path:
WBM > Explorers > Security > (double-click) VPN > (double-click) Tunnels > (right-click) Active
Tunnels > Display General Tunnel Data
The Active IPsec Tunnels mask is displayed. Each line in the table shown represents an active
tunnel. For descriptions of the individual columns, see Section 7.2.5.53, "Adding tunnels". The
relevant transmit and receive rules are also displayed for each service.