EasyManua.ls Logo

AudioCodes Media 800 MSBR User Manual

AudioCodes Media 800 MSBR
1002 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #561 background imageLoading...
Page #561 background image
Version 6.6 561 Mediant 800 MSBR
User's Manual 43. VPN
43 VPN
The VPN menu allows you to configure Virtual Private Networking (VPN) over the Internet,
and includes the following items:
IPSec (see 'Configuring IPsec' on page 561)
L2TP (see 'Configuring L2TP Server' on page 563)
43.1 Configuring IPSec
Internet Protocol Security (IPSec) is a series of guidelines for the protection of Internet
Protocol (IP) communications. It specifies procedures for securing private information
transmitted over public networks. The IPSec protocols include:
AH (Authentication Header) provides packet-level authentication.
ESP (Encapsulating Security Payload) provides encryption and authentication.
IKE (Internet Key Exchange) negotiates connection parameters, including keys for the
other two services.
Services supported by the IPSec protocols (AH, ESP) include confidentiality (encryption),
authenticity (proof of sender), integrity (detection of data tampering), and replay protection
(defense against unauthorized resending of data). IPSec also specifies methodologies for
key management. Internet Key Exchange (IKE), the IPSec key management protocol,
defines a series of steps to establish keys for encrypting and decrypting information; it
defines a common language on which communications between two parties is based.
Developed by the Internet Engineering Task Force (IETF), IPSec and IKE together
standardize the way data protection is performed, thus making it possible for security
systems developed by different vendors to interoperate.
To configure IPSec:
1. Click the IPSec item (Configuration tab > Data menu > VPN submenu > IPSec); the
following page appears:
Figure 43-1: Configuring VPN IPSec
The Connections' group displays a list of IPSec connections (to create an IPSec
connection, see 'Configuring Network Connections' on page 583).
2. To block unauthorized IP to the device, do the following:
a. Select the 'Block Unauthorized IP' check box.
b. In the 'Maximum Number of Authentication Failures' field, enter the maximum
number of packets to authenticate before blocking the origin's IP address.
c. In the 'Block Period' field, enter the time frame during which the device drops
packets from an unauthorized IP address.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the AudioCodes Media 800 MSBR and is the answer not in the manual?

AudioCodes Media 800 MSBR Specifications

General IconGeneral
BrandAudioCodes
ModelMedia 800 MSBR
CategoryNetwork Router
LanguageEnglish

Related product manuals