Chapter 11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Configuration parameters - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Chapter 11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 258 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IPSec policy list
Open the
Security > IPSec
page.
IPSec security
policy database
The table on this page displays all IPSec security policies defined on the CN3000.This
includes policies used to secure the wireless network as well as create secure
connections to remote peers via the Internet port.
A security policy defines the criteria that must be met for a peer to establish an IPSec
security association (SA) with the CN3000. Depending on its settings, a policy may
allow one or more peers to establish an SA with the CN3000. Each time an SA is
established, a new entry is added to the IPSec security associations table. Click
IPSec
on the
Status
menu to view this table.
Name
Name assigned to the security policy.
Port
Port assigned to the security policy.
Peer address
Address of the peer which can establish an SA using this policy.
Mode
Indicates the IPSec mode (tunnel or transport) supported by this policy.
Status
Indicates whether the policy has been enabled. An SA can only be established when a
policy is enabled.
Authentication
Indicates the method used to authenticate peers.
Summary of Contents for CN3000
Page 1: ...CN3000 Administrator s Guide...
Page 8: ...Table of Contents 8...
Page 60: ...Chapter 2 How it works Chapter 2 60...
Page 94: ...Chapter 4 Scenarios Chapter 4 94...
Page 106: ...Chapter 5 Activating the public access interface Chapter 5 106...
Page 211: ...Chapter 10 SSL certificates Chapter 10 211...
Page 292: ...Chapter 13 The configuration file Chapter 13 292...
Page 370: ...Chapter 16 Sample setup Microsoft RADIUS Chapter 16 370...
Page 396: ...Chapter 16 Sample setup Microsoft RADIUS Chapter 16 396...
Page 414: ...Chapter 17 Experimenting with NOC authentication Chapter 17 414...