13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 17: Configuring IPSec VPNThis chapter provides information about configuring IPSec VPN in <strong>the</strong> <strong>G350</strong>, and contains <strong>the</strong>following sections:●●●●Overview <strong>of</strong> IPSec VPN — an overview <strong>of</strong> VPN and IPSec technologyConfiguring a site-to-site IPSec VPN — instructions on how to configure IPSec VPN in <strong>the</strong><strong>G350</strong>IPSec VPN maintenance — instructions on displaying and clearing IPSec VPN data, aswell as viewing <strong>the</strong> IPSec VPN logTypical installations — illustrations <strong>of</strong> IPSec VPN typical applicationsOverview <strong>of</strong> IPSec VPNVPN (Virtual Private Network) defines a private secure connection between two nodes on apublic network such as <strong>the</strong> Internet. VPN at <strong>the</strong> IP level is deployed using IPSec. IPSec (IPSecurity) is a standards-based set <strong>of</strong> protocols defined by <strong>the</strong> IETF that provide privacy,integrity, and au<strong>the</strong>nticity to information transferred across IP networks.The standard key exchange method employed by IPSec uses <strong>the</strong> IKE (Internet Key Exchange)protocol to exchange key information between <strong>the</strong> two nodes (called peers). Each peermaintains SAs (security associations) to maintain <strong>the</strong> private secure connection. IKE operatesin two phases: <strong>the</strong> Phase-1 exchange negotiates an IKE SA. The IKE SA created in Phase-1secures <strong>the</strong> subsequent Phase-2 exchanges, which in turn generate IPSec SAs. IPSec SAssecure <strong>the</strong> actual traffic between <strong>the</strong> protected networks behind <strong>the</strong> peers, while <strong>the</strong> IKE SAonly secures <strong>the</strong> key exchanges that generate <strong>the</strong> IPSec SAs between <strong>the</strong> peers.The <strong>G350</strong> IPSec VPN feature is designed to support site-to-site topologies, in which <strong>the</strong> twopeers are <strong>Gateway</strong>s.Issue 3 January 2005 203

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!