Page 33
Series 2000/3000 IDU User’s Manual
Revision P4
4.2.2 Viewing or Modifying an IPSec Server Table Entry
To view or modify an IPSec server table entry, choose the entry from the IPSec Server
Table Configuration drop-down box. The table below describes the parameters that can be
viewed or modified.
Table 4.1 IPSec Configuration Parameters
When you have finished modifying these parameters, click Save This IPSec Server
Table Entry at the bottom of the page. This opens the Superuser Menu Result page,
enabling you to reboot the IDU and implement the modifications (see
Appendix B
).
4.2.3 Deleting an IPSec Server Table Entry
To delete an IPSec server table entry, choose the entry from the IPSec Server Table Con-
figuration drop-down box. Next, click Delete This IPSec Server Table Entry.
4.3
RADIUS Configuration
The IDU implements RADIUS authentication with a RADIUS server at the hub. If the
RADIUS Flag is set, the IDU must authenticate with the RADIUS server before it can use
the satellite network to send and receive traffic data.
4.3.1 Current Status of RADIUS Authentication
To check the current status of the SIT’s RADIUS authentication, open the IDU Monitoring
page and check the Authentication State parameter (see
section 3.1
).
• Not Enabled. RADIUS authentication is disabled for the SIT (see below).
Table 10:
Parameter
Description
IPSec Server IP
Address
The IP address of the primary IPSec server.
Upon initially receiving host traffic, the IDU will attempt to establish a
tunnel with the primary IPSec server. In the event where the primary
IPSec server does not respond, the IDU will then attempt to negotiate
with the backup IPSec server (see below).
This parameter is set during initial configuration of the IDU (see the
Installation Manual,
section 3.6
).
IPSec Backup Server
IP Address
The IP address of the Backup IPSec server.
This parameter is set during initial configuration of the IDU (see the
Installation Manual,
section 3.6
).
IPSec Roll-Over
Time
When the connection with the primary IPSec server fails, the IDU will
try to connect to the backup IPSec server when the roll-over time
elapses.
IPSec Re-key Time
If the SIT IPSec re-key timeout expires, the SIT will re-negotiate the
key.
IPSec Server Status
To enable this IPSEC server connection, the status must be “Active”.
This parameter is set during initial configuration of the IDU (see the
Installation Manual,
section 3.6
).