...
Note |
---|
icon | false |
---|
title | Prerequisites |
---|
|
Before you can create an IPsec Tunnel Entry you must have done the need to meet one of the following conditions: - A Sonus SBC Certificate and Trusted CA Certificate must be obtained and imported to the SBC when Certificate is selected Authentication Mode list box in the Authentication Parameters panel. Refer to Working with Certificates for information about configuring certificates on the SBC.
- An IPsec license is required to manage IPsec tunnels.
|
Info |
---|
icon | false |
---|
title | Important Information for Previous SIP-TLS Users: |
---|
|
- When upgrading to version 3.0 existing Sonus SBC Certificates will fail authentication due to key integrity verification errors when used to bring up the IPsec tunnel in the Certificate authentication mode.
- Before beginning to manage an IPsec tunnel for Certificate authentication, you must generate a new Certificate Signing Request (CSR), re-sign, and re-import a new Sonus SBC Certificate.
|
To create or modify an existing IPsec Tunnel:
...
The Restart Service button on the IPsec Tunnel Table page enables you to restart the services in order for any changes to the system certificates to become effective. For more information about system certificates, see refer to Managing IPsec Tunnels.
- Click on Restart Services on the IPsec Tunnel Table page. A confirmation window is displayed.
- Click OK.
Creating an IPsec Tunnel
Info |
---|
The SBC supports IPv4 addresses for this feature; IPv6 is not supported. |
To create an IPsec Tunnel
Click the Create IPsec Tunnel Entry ( ) icon on the IPsec Connection Table page.
Panel |
---|
|
Caption |
---|
0 | Figure |
---|
1 | Create IPsec Tunnel Entry |
---|
| |
|
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the operating mode for communication with the remote VPN peer for IKE negotiations and IPsec connections. Initiator: Enables the branch office SBC gateway to initiate the IKE Security Association (SA) and IPsec tunnel negotiation request. Responder: Enables the corporate SBC gateway to receive the request to establish an IKE/IPsec tunnel connection. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the how SBC communications with the remote VPN peer is initiated. The IKE and IPsec phase negotiations are initiated as either permanent or on-demand depending on the type of activation selected. This field is only visible when "Initiator" is selected in the Operating Mode list box. Always: Initiates the IKE Security Association(SA) and IPsec phase negotiations permanently with the remote VPN peer. Link Monitor Action: Initiates the IKE and IPsec phase negotiations with the remote VPN peer as on-demand upon request from the link monitor switch-over action. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the IP address or fully-qualified domain name of the local network interface. If Allow Any Local Address is enabled, then the SBC allows any outgoing address during negotiations. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the IP address or fully-qualified domain name of the remote network interface. If Allow any remote address is enabled, the SBC allows any incoming address during negotiations. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies whether or not the SBC requests a renegotiation when the connection expires.Enabled: Initiate SA Negotiation upon connection expiry. Applies to both IKE SA and IPsec SA. Disabled: SA Negotiation is not initiated upon connection expiry. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the number of times the SBC will attempt to negotiate a connection. Applies to both IKE SA and IPsec SA.If the number of number of retries value is exceeded, the SBC issues a Tunnel Link Lost alarm." |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies whether or not the SBC reauthenticates when a re-key is accomplished.Enabled: IKE SA Rekeying also initiates Peer Authentication. IKE and IPsec SA's are uninstalled then recreated. Disabled: IKE SA Rekeying performed without the Peer Authentication. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies whether or not the Subject Alternative Name (SAN) Identifier is used for peer authentication. This field is only visible when Certificate is selected from the "Authentication Mode* select list. Enabled: The SAN Identifier is sent to the remote gateway for an authentication match. The SAN identifier must be configured in the Local SAN Identifier attribute when this option is Enabled. Disabled: By default, the Sonus SBC Certificate's Subject Distinguished Name (Subject DN) identifier is automatically extracted from the certificate and sent to the remote gateway for an authentication config match. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the SAN identifier to be sent to the remote gateway for a peer authentication config match. This field is only available if Enabled is selected in the Use SAN Identifier select list. If the Peer Authentication Identifier on the remote gateway is configured to authenticate a SAN identifier from the peer's certificate, it will attempt to match its configured SAN identifier with the expected SAN identifier retrieved from the peer authentication config. If Use SAN Identifier is enabled, the SAN identifier must be picked from a list of DNS names displayed under the local attributes for the Sonus SBC Certificate. |
Authentication Mode
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies the authentication method required from the remote side. Certificate: Specifies the use of public key signature when authenticating the peer VPN gateway. The SBC must contain a valid server certificate/private key, the Certificate Authority (CA) that signed the SBC server certificate, and the CA that signed the peer's Server Certificate.Preshared Key: Specifies the key to be shared with the peer. This key must match the same key configured on the peer system. |
...
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies Internet Key Exchange(IKE) Encapsulating Security Payload (ESP) the IKE ESP and hash algorithm. |
DH Group
Panel |
---|
bgColor | #FAFAFA |
---|
borderStyle | none |
---|
|
Specifies which Diffie-Hellman group to use for exchanging keys (IKE and ESP). |