Instruction manual
Section 4, User Interface Guide NetVanta 2000 Series System Manual
68 © 2002 ADTRAN, Inc. 61200361L1-1E
algorithm) and the NetVanta 2000 series will use the ASCII of each character to create the hex bytes
needed for the algorithm. This key value should match to the corresponding inbound key value on the
remote end SG.
IN ESP K
EY
- is encryption key used for deciphering the datagrams coming in from the remote end SG.
Length of this key for DES must be 8 bytes, and for 3DES must be 24 bytes. For utilizing the 3DES
advantage, each 8-byte set in this keying material should be different. This key value should match to the
outbound ciphering key on the remote end SG.
OUT ESP K
EY
- is encryption key used for ciphering the datagrams going out to the remote end SG
through the Internet. Length of this key for DES must be 8 bytes, and for 3DES must be 24 bytes. For
utilizing the 3DES advantage, each 8-byte set in this keying material should be different. This key value
should match to the inbound deciphering key on the remote end SG.
> POLICIES > VPN > TUNNELS (IPSEC TUNNELS) > AUTOMATIC KEY MANAGEMENT
To use the automatic key management click A
UTO
button. This will bring up the A
UTO
VPN P
OLICY
C
ONFIGURATION
screen.
P
OLICY
N
AME
- is a symbolic name of the VPN policy. Each policy should have an unique policy name.
S
OURCE
A
DDRESS
- Drop down menu allows you to configure the source IP address of the outbound
network traffic for which this VPN policy will provide security. Mostly, this address will be from your
corporate network address space. All entries in the IP Address Table appear in this drop down menu. You
can choose one of these, or select OTHER option from this menu and define the source IP address/subnet
in the immediately following text boxes. ANY option in this menu represents all valid IP addresses in the
Internet address space.
D
ESTINATION
A
DDRESS
- Drop down menu allows you to configure the destination IP address of the
outbound network traffic for which this VPN policy will provide security. Mostly, this address will be from
remote site's corporate network address space. All entries in the IP Address Table appear in this drop down
menu. You can choose one of these, or select OTHER option from this menu and define the destination IP
address/subnet in the immediately following text boxes. ANY option in this menu represents all valid IP
addresses in the Internet address space.
S
OURCE
P
ORT
- Drop down menu allows you select the source port value for this VPN policy selector. All
entries in the Services table appear in this menu. You can choose one from these, or select OTHER option
and define the Source Port in the immediately following text box. ANY option in this menu indicates the
complete port range i.e. 1 to 65535.
D
ESTINATION
P
ORT
- Drop down menu allows you select the destination port value for this VPN policy
selector. All entries in the Services table appear in this menu. You can choose one from these, or select
OTHER option and define the Destination Port in the immediately following text box. ANY option in this
If the access policies are wider than the IPSec policies, the traffic which doesn’t fall in the
range of the IPSec policy will be passed through as plain packets.