Alcatel-Lucent OmniAccess 3500 Manuale Utente
OmniAccess 3500 Nonstop Laptop Guardian Administration Guide
existing IPsec tunnel is not found for a matching packet, it is created before
the packet is delivered), <From Tunnel> (packets matching the rule are
received from an IPsec tunnel whose profile is identified by the <From Tunnel>
value; if a remote request to open an IPsec tunnel is received on a packet
whose header matches the rule, the OmniAccess 3500 NLG gateway uses the
the packet is delivered), <From Tunnel> (packets matching the rule are
received from an IPsec tunnel whose profile is identified by the <From Tunnel>
value; if a remote request to open an IPsec tunnel is received on a packet
whose header matches the rule, the OmniAccess 3500 NLG gateway uses the
tunnel profile specified in the <From Tunnel> value to conduct the subsequent
negotiations).
negotiations).
o
To Tunnel: Name of the tunnel profile for the IPsec tunnel that dispatches the
matching packet.
matching packet.
o
From Tunnel: Name of the tunnel profile for the IPsec tunnel over which the
matching packet is received.
matching packet is received.
4. Click Save.
Figure 15 - Connection Manager Rules (Add)
T
UNNEL
T
ABLE
The Tunnel Table contains a list of tunnel profiles used to define the parameters of
the IKE and IPsec Security Associations that are created either by the OmniAccess 3500
NLG gateway or by request of the OmniAccess 3500 NLG cards. More specifically, the
configuration of the Tunnel Table entries drives the run-time selection of the hashing
and encryption algorithms used for message authentication and content protection in
the IKEv2 and IPsec exchanges.
To add a tunnel profile:
1. Click Gateway on the main menu and then click Configure Advanced Settings.
2. On the Configure menu, click Tunnel Table.
the IKE and IPsec Security Associations that are created either by the OmniAccess 3500
NLG gateway or by request of the OmniAccess 3500 NLG cards. More specifically, the
configuration of the Tunnel Table entries drives the run-time selection of the hashing
and encryption algorithms used for message authentication and content protection in
the IKEv2 and IPsec exchanges.
To add a tunnel profile:
1. Click Gateway on the main menu and then click Configure Advanced Settings.
2. On the Configure menu, click Tunnel Table.
20