Server User Manual
Table Of Contents
- SDS/SCS/STS/MDC User’s Guide
- Table of Contents
- Preface
- Introduction
- Hardware and Connectivity
- Configuration Methods
- Getting Started
- Using DeviceManager and WebManager
- Network Settings
- Configuring Serial Ports
- Introduction
- Serial Ports
- Serial Port Profiles
- Common Tabs
- Console Management Profile
- TruePort Profile
- TCP Sockets Profile
- UDP Sockets Profile
- Terminal Profile
- User Service Settings
- Printer Profile
- Serial Tunneling Profile
- Virtual Modem Profile
- Control Signal I/O Profile
- Modbus Gateway Profile
- Power Management Profile
- Remote Access (PPP) Profile
- Remote Access (SLIP) Profile
- Custom Application Profile
- Port Buffering
- Advanced
- Configuring Users
- Configuring Security
- Configuring I/O Interfaces
- Configuring Clustering
- Configuring the Option Card
- Configuring the System
- Controlling the RPS, I/O Channels, and IPsec Tunnels
- System Administration
- Introduction
- Managing Configuration Files
- Downloading IOLAN Firmware
- Calibrating I/O
- Setting the IOLAN’s Date and Time
- Rebooting the IOLAN
- Resetting the IOLAN to Factory Defaults
- Resetting the SecurID Node Secret
- Language Support
- Downloading Terminal Definitions
- Resetting Configuration Parameters
- Lost Admin Password
- Applications
- RADIUS and TACACS+
- SSL/TLS Ciphers
- Virtual Modem AT Commands
- Pinouts and Cabling Diagrams
- Setting Jumpers
- I/O Wiring Diagrams
- Utilities
- Accessories
- Troubleshooting
- Introduction
- Hardware Troubleshooting
- Communication Issues
- DeviceManager Problems
- Host Problems
- RADIUS Authentication Problems
- Login Problems
- Problems with Terminals
- Unknown IP Address
- DHCP/BOOTP Problems
- Callback Problems
- Language Problems
- Modem Problems
- PPP Problems
- Printing Problems
- Long Reboot Cycle
- SSL/TLS
- I/O Models
- IPv6 Issues
- Contacting Technical Support
- Glossary
- Index

341
Configuring a Virtual Private Network
2. Use a utility (for example, Openswan’s newhostkey/showhostkey utilities) to generate the RSA
signature public key. Copy the public key portion to a file using the following format:
<description>=<keydata>
or just
<keydata>
For example:
# RSA 1024 bits scs48_vpn Tue Jan 3 15:29:33 2006
leftrsasigkey=0sAQOEmzSTdNv1ZUJW9UmPtUY84gM5AGEAOq9gUwFqnOUsESfnuXlxPe+Mc+uf
XYvg1vxYZ0XhdIh1FwFeeIQLyRvD447mjriMFjJfheMUtHqOZhvWSE18ZfGEXNOo7yagZqLzjxu9
XJIA2SAGV+/LL3epPqW2fV5ORxVrf7uWn7I5FQ==
Note that the pound sign (#) indicates a comment line and all characters in that line are ignored.
The key value itself should not have an carriage returns.
3. In the DeviceManager, select Tools, Advanced, Keys and Certificates. In the WebManager,
select
Tools, Administration, Keys/Certificates. Download the RSA signature file to the
DeviceManager, specifying the IPsec tunnel it’s for:
4. In the same Keys and Certificates window, upload the IOLAN’s RSA signature public key:
Install the IOLAN’s public key in the remote VPN gateway for the Serial_Devices IPsec tunnel.
5. Enable the IPsec service found in Security, Services.










