Specifications

Explorers Nur für den internen Gebrauch
A31003-H3580-M103-2-76A9, 01-2009
7-72 HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
hg-07.fm
Security
7.2.5.52 Displaying general tunnel data
You can view a table listing detailed information for all configured tunnels.
WBM path:
WBM > Explorers > Security > (double-click) VPN > (double-click) Tunnels > (right-click) Con-
figured Tunnels > Display General Tunnel Data
The Configured IPsec Tunnels mask is displayed. Each line in the table shown represents a
configured tunnel. For descriptions of the individual columns, see Section 7.2.5.53, "Adding
tunnels". The relevant transmit and receive rules are also displayed for each service.
7.2.5.53 Adding tunnels
You can add a new IPsec tunnel. A total of 256 tunnels can be configured for each HG 1500.
WBM path:
WBM (write access activated with the Padlock icon in the control area?) > Explorers > Security
> (double-click) VPN > (double-click) Tunnels > (right-click) Configured Tunnels > Add Tunnel
The Add Configured IPsec Tunnel mask is displayed.
Click the Tunnel Data option at the top of the input form. You can then edit the following fields:
Tunnel Name: This field contains the name of the newly configured tunnel. Enter a charac-
ter string in this field.
Type of the Local Tunnel Endpoint: Select the endpoint address type at the sending end of
the tunnel; you can specify a host name or a DNS name.
Local Tunnel Endpoint Address: Enter the sender’s address in a format suitable for the end-
point type.
Type of the Remote Tunnel Endpoint: Select the type of the endpoint address on the tunnel
receive side (only the IP address is currently supported).
Remote Tunnel Endpoint Address: Enter the receive address in a format suitable for the
endpoint type. In this field, 0.0.0.0 indicates that the tunnel endpoint is unknown. In this
case, the tunnel must be configured by the peer (e.g. teleworker).
Session Key Handling: Select the method for the key exchange (at present the only option
is: Automatically, using IKE protocol).
Suggested Encryption Algorithms: Select which encryption algorithms should be used (you
can choose between AES, DES and 3DES)