
Table of Contents
IPLink 3210 Series Getting Started Guide
6
Power connection and default configuration ...................................................................................................36
Connect with the serial interface .....................................................................................................................36
Login ..............................................................................................................................................................37
Changing the IP address .................................................................................................................................37
2. Connect the IPLink VPN Router to the network ..............................................................................................38
3. Load configuration ............................................................................................................................................38
4G.SHDSL Basic Configuration ..................................................................................................................... 40
Introduction..........................................................................................................................................................41
Line Setup .............................................................................................................................................................41
Configuring PPPoE...............................................................................................................................................41
Configuration Summary........................................................................................................................................42
Setting up permanent virtual circuits (PVC)..........................................................................................................43
Using PVC channels in bridged Ethernet mode ..............................................................................................43
Using PVC channels with PPPoE ...................................................................................................................43
Diagnostics .....................................................................................................................................................44
Troubleshooting DSL Connections.......................................................................................................................44
5VPN configuration ........................................................................................................................................ 45
Introduction..........................................................................................................................................................46
Authentication ................................................................................................................................................46
Encryption ......................................................................................................................................................46
Transport and tunnel modes ...........................................................................................................................47
VPN configuration task list ...................................................................................................................................47
Creating an IPsec transformation profile .........................................................................................................47
Creating an IPsec policy profile .......................................................................................................................48
Creating/modifying an outgoing ACL profile for IPsec ...................................................................................50
Configuration of an IP interface and the IP router for IPsec ............................................................................51
Displaying IPsec configuration information ....................................................................................................51
Debugging IPsec .............................................................................................................................................52
Sample configurations ...........................................................................................................................................53
IPsec tunnel, DES encryption .........................................................................................................................53
IPLink configuration .................................................................................................................................53
Cisco router configuration .........................................................................................................................54
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ....................54
IPLink configuration .................................................................................................................................54
Cisco router configuration .........................................................................................................................55
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96 ..................55
IPLink configuration .................................................................................................................................55
Cisco router configuration .........................................................................................................................55
6Access control list configuration.................................................................................................................... 57
Introduction..........................................................................................................................................................58
About access control lists .......................................................................................................................................58
What access lists do .........................................................................................................................................58
Why you should configure access lists .............................................................................................................58