5
OnSite Model 3210 User Manual Table of Contents
Power connection and default configuration ...................................................................................................33
Connect with the serial interface .....................................................................................................................33
Login ..............................................................................................................................................................34
Changing the IP address .................................................................................................................................34
2. Connect the OnSite VPN Router to the network..............................................................................................35
3. Load configuration ............................................................................................................................................35
4 G.SHDSL Basic Configuration ..................................................................................................................... 37
Introduction..........................................................................................................................................................38
Line Setup .............................................................................................................................................................38
Configuring PPPoE...............................................................................................................................................38
Configuration Summary........................................................................................................................................39
Setting up permanent virtual circuits (PVC)..........................................................................................................40
Using PVC channels in bridged Ethernet mode ..............................................................................................40
Using PVC channels with PPPoE ...................................................................................................................40
Diagnostics .....................................................................................................................................................41
Troubleshooting DSL Connections.......................................................................................................................41
5 VPN configuration ........................................................................................................................................ 42
Introduction..........................................................................................................................................................43
Authentication ................................................................................................................................................43
Encryption ......................................................................................................................................................43
Transport and tunnel modes ...........................................................................................................................44
VPN configuration task list ...................................................................................................................................44
Creating an IPsec transformation profile .........................................................................................................44
Creating an IPsec policy profile .......................................................................................................................45
Creating/modifying an outgoing ACL profile for IPsec ...................................................................................47
Configuration of an IP interface and the IP router for IPsec ............................................................................48
Displaying IPsec configuration information ....................................................................................................48
Debugging IPsec .............................................................................................................................................49
Sample configurations ...........................................................................................................................................50
IPsec tunnel, DES encryption .........................................................................................................................50
OnSite configuration .................................................................................................................................50
Cisco router configuration ........................................................................................................................51
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ....................51
OnSite configuration .................................................................................................................................51
Cisco router configuration ........................................................................................................................52
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96 ..................52
OnSite configuration .................................................................................................................................52
Cisco router configuration ........................................................................................................................52
6 Access control list configuration.................................................................................................................... 54
Introduction...............................................................................................................................
...........................55
About access control lists .......................................................................................................................................55
What access lists do .........................................................................................................................................55
Why you should configure access lists .............................................................................................................55