10.12.2012 Views

Administration HiPath 3000/5000 V7 IP systems

Administration HiPath 3000/5000 V7 IP systems

Administration HiPath 3000/5000 V7 IP systems

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>3000</strong>sb4.fm<br />

<strong>HiPath</strong> <strong>3000</strong>/<strong>5000</strong> in the LAN Network For internal use only<br />

HG 1500 V3.0<br />

Since a gateway in insecure mode would represent a weak point in the VPN, it must be placed<br />

in secure mode before the VPN can be configured. This requires a certain degree of effort to<br />

prevent any hackers from getting into the system during this phase of the process and undermining<br />

the subsequent steps taken.<br />

The following steps must be taken for the gateway to be in secure mode:<br />

1. Connect a terminal (or a PC with a terminal emulation program) to the V.24 interface of the<br />

gateway.<br />

2. Restart the gateway with the CLI command reset secure. When this is done, all user<br />

settings are lost and all user data transmissions are interrupted until the gateway is reconfigured.<br />

At this point, the gateway is in "activation of SSL" mode. In this mode it can only be configured<br />

using CLI at the V.24 interface – WBM, Telnet, <strong>HiPath</strong> <strong>3000</strong> Manager E and SNMP<br />

are disabled.<br />

3. The gateway must be set up for SSL mode. First, the CLI command create SSL certificate<br />

must be used to generate a server certificate with which the gateway can identify<br />

itself to SSL clients. After that, SSL can be activated with the enable ssl command.<br />

At this point, the gateway is in "secure administration" mode and can only be configured<br />

using CLI at the V.24 interface or WBM via HTTPS – Telnet, <strong>HiPath</strong> <strong>3000</strong> Manager E and<br />

SNMP are disabled.<br />

4. Start the browser for access to WBM and enter the gateway address with the protocol "https://"<br />

(you can enter the port number "443" after the gateway address). The browser displays<br />

the previously configured server certificate which must be manually checked and approved.<br />

It can now also be installed in the browser to avoid future requests for it.<br />

Use WBM to set up the VPN as described in the following section.<br />

4.5.10.2 Security Policy<br />

The security policy determines the procedure for <strong>IP</strong> packets. The following actions are possible:<br />

● rejecting<br />

● forwarding (normal routing without VPN functionality)<br />

● tunneling (forwarding over the VPN)<br />

The handling of <strong>IP</strong> packets can be specified in the HG 1500 V3.0 according to <strong>IP</strong> address, port<br />

number and protocol (TCP or UDP). For tunneled packets, you must determine:<br />

● which algorithms for encryption and authentication are permissible on the connection,<br />

● the period of validity for the security association.<br />

P31003-H3570-Y100-4-7618, 2007-10-31<br />

4-40 <strong>HiPath</strong> <strong>3000</strong>/<strong>5000</strong> <strong>V7</strong>, System Description

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!