User`s guide
Table of Contents
XSR-1805 User’s Guide xxv
How a Virtual Private Network Works .....................................................................233
Ensuring VPN Security with IPSec/IKE ..........................................................................234
Defining VPN Encryption ...........................................................................................236
Describing Public-Key Infrastructure (PKI).....................................................................237
Digital Signatures..........................................................................................................237
Certificates .....................................................................................................................238
Machine Certificates for the XSR................................................................................239
CA Hierarchies..............................................................................................................239
Certificate Chains..........................................................................................................240
RA Mode ........................................................................................................................242
Pending Mode ...............................................................................................................242
Enroll Password ............................................................................................................243
CRL Retrieval ................................................................................................................243
Renewing and Revoking Certificates.........................................................................243
DF Bit Functionality.............................................................................................................243
VPN Applications ................................................................................................................244
Site-to-Site Networks....................................................................................................245
Site-to-Central-Site Networks .....................................................................................247
Client Mode ........................................................................................................... 248
Network Extension Mode (NEM) ...................................................................... 248
Remote Access Networks ............................................................................................249
Using OSPF Over a VPN Network ............................................................................250
OSPF Commands.................................................................................................. 251
Configuring OSPF Over Site-to-Site in Client Mode....................................... 251
Configuring OSPF Over Site-to-Site in Network Extension Mode ............... 254
Server...................................................................................................................... 255