Server User Manual
Table Of Contents
- SDS/SCS/STS/MDC User’s Guide
- Table of Contents
- Preface
- Introduction
- Hardware and Connectivity
- Configuration Methods
- Getting Started
- Using DeviceManager and WebManager
- Network Settings
- Configuring Serial Ports
- Introduction
- Serial Ports
- Serial Port Profiles
- Common Tabs
- Console Management Profile
- TruePort Profile
- TCP Sockets Profile
- UDP Sockets Profile
- Terminal Profile
- User Service Settings
- Printer Profile
- Serial Tunneling Profile
- Virtual Modem Profile
- Control Signal I/O Profile
- Modbus Gateway Profile
- Power Management Profile
- Remote Access (PPP) Profile
- Remote Access (SLIP) Profile
- Custom Application Profile
- Port Buffering
- Advanced
- Configuring Users
- Configuring Security
- Configuring I/O Interfaces
- Configuring Clustering
- Configuring the Option Card
- Configuring the System
- Controlling the RPS, I/O Channels, and IPsec Tunnels
- System Administration
- Introduction
- Managing Configuration Files
- Downloading IOLAN Firmware
- Calibrating I/O
- Setting the IOLAN’s Date and Time
- Rebooting the IOLAN
- Resetting the IOLAN to Factory Defaults
- Resetting the SecurID Node Secret
- Language Support
- Downloading Terminal Definitions
- Resetting Configuration Parameters
- Lost Admin Password
- Applications
- RADIUS and TACACS+
- SSL/TLS Ciphers
- Virtual Modem AT Commands
- Pinouts and Cabling Diagrams
- Setting Jumpers
- I/O Wiring Diagrams
- Utilities
- Accessories
- Troubleshooting
- Introduction
- Hardware Troubleshooting
- Communication Issues
- DeviceManager Problems
- Host Problems
- RADIUS Authentication Problems
- Login Problems
- Problems with Terminals
- Unknown IP Address
- DHCP/BOOTP Problems
- Callback Problems
- Language Problems
- Modem Problems
- PPP Problems
- Printing Problems
- Long Reboot Cycle
- SSL/TLS
- I/O Models
- IPv6 Issues
- Contacting Technical Support
- Glossary
- Index

345
Configuring a Virtual Private Network
VPN Client-to-Network
The following example shows how to configure a VPN client-to-network IPsec tunnel. In this
example, the IOLAN will accept VPN connections from multiple VPN clients on private networks
that want to access the public
199.24.0.0 subnetwork through the VPN gateway. NAT Traversal
(NAT_T)
is disabled in this example (on both sides) because the VPN tunnel is going private network
to public network.
Broadband
Router
VPN Client
199.24.10.10
Internet
172.16.45.45
199.24.45.12
199.24.45.87
Initiate Communication
Right
IPsec Tunnel--Encrypted Data
Unencrypted
Data
172.16.45.99
Router
199.24.10.1
Configure the IPsec tunnel in the IOLAN:
The Remote IP Address field is %any to allow any VPN client to communicate in the IPsec tunnel
that can validate the
Secret. Also, the Remote Host/Network field is configured for 0.0.0.0 to
allow any remote peer private IP address (RFC 1918—10.0.0.0/8, 172.16.0.0./12, 192.168.0.0/16)
access to the IPsec tunnel. Lastly, the
Boot Action is set to Add to listen for an IPsec tunnel
connection.
Enable the IPsec service found in Security, Services.










