Panasonic Nortel VPN User Manual

Version 7.00
Part No. NN46110-500
311642-M Rev 01
February 2007
Document status: Standard
600 Technology Park Drive Billerica, MA 01821-4130
Nortel VPN Router Configuration — Basic Features
N&RTEL
2

Copyright © 2007 Nortel Networks. All rights reserved.

The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document.

TrademarksNortel

Nortel Networks, the Nortel Networks logo, and Nortel VPN Router are trademarks of Nortel Networks. Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated. Java is a trademark of Sun Microsystems. Microsoft, Windows, Windows NT, and MS-DOS are trademarks of Microsoft Corporation. NETVIEW is a trademark of International Business Machines Corp (IBM). OPENView is a trademark of Hewlett-Packard Company. SPECTRUM is a trademark of Cabletron Systems, Inc. All other trademarks and registered trademarks are the property of their respective owners.

Restricted rights legend

Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.

Statement of conditions

In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the right to make changes to the products described in this document without notice.
Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Portions of the code in this software product may be Copyright © 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that such portions of the software were developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from such portions of the software without specific prior written permission.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties).
NN46110-500
3

Nortel Networks Inc. software license agreement

This Software License Agreement (“License Agreement”) is between you, the end-user (“Customer”) and Nortel Networks Corporation and its subsidiaries and affiliates (“Nortel Networks”). PLEASE READ THE FOLLOWING CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT. If you do not accept these terms and conditions, return the Software, unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price.
“Software” is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data, audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for the selection of the Software and for the installation of, use of, and results obtained from the Software.
1. Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the Software on
only one machine at any one time or to the extent of the activation or authorized usage level, whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer furnished equipment (“CFE”), Customer is granted a nonexclusive license to use Software only on such hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as confidential information using the same care and discretion Customer uses with its own similar information that it does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify, transfer or distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d) sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of this provision. Upon termination or breach of the license by Customer or in the event designated hardware or CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction. Nortel Networks may audit by remote polling or other reasonable means to determine Customer’s Software activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks with respect to such third party software.
2. Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer,
Software is provided “AS IS” without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties, and, in such event, the above exclusions may not apply.
3. Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE
LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN ADVISED OF THEIR POSSIBILITY. The forgoing limitations of remedies also apply to any developer and/or supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply.
4. General
a. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks
Software available under this License Agreement is commercial computer software and commercial computer software documentation and, in the event Software is licensed for or on behalf of the United States
Nortel VPN Router Configuration — Basic Features
4
Government, the respective rights to the software and software documentation are governed by Nortel
Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections
12.212 (for non-DoD entities) and 48 C.F.R. 227.7202 (for DoD entities).
b. Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer fails
to comply with the terms and conditions of this license. In either event, upon termination, Customer must either return the Software to Nortel Networks or certify its destruction.
c. Customer is responsible for payment of any taxes, including personal property taxes, resulting from
Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable
export and import laws and regulations. d. Neither party may bring an action, regardless of form, more than two years after the cause of the action arose. e. The terms and conditions of this License Agreement form the complete and exclusive agreement between
Customer and Nortel Networks. f. This License Agreement is governed by the laws of the country in which Customer acquires the Software. If
the Software is acquired in the United States, then this License Agreement is governed by the laws of the state
of New York.
NN46110-500

Contents

Preface...........................................................................................................15
Before you begin ......................................................................................................... 15
Text conventions.......................................................................................................... 15
Acronyms......................................................................................................................17
Related publications.....................................................................................................19
Hard-copy technical manuals.......................................................................................20
How to get Help............................................................................................................20
Finding the latest updates on the Nortel Web site.................................................20
Getting help from the Nortel Web site....................................................................20
Getting help over the phone from a Nortel Solutions Center Getting help from a specialist by using an Express Routing Code
Getting help through a Nortel distributor or reseller..............................................21
New in this release........................................................................................23
Features.................................................................................................................23
................................
......................
Network Time Protocol (NTP) support for Daylight Savings Time 2007 change
....................................................................................................................23
Systemlog lifetime or disk size limit usage option...........................................24
FTP server passive mode parameter .............................................................24
Source IPs access restriction to management ...............................................24
SSH server configurations ..............................................................................24
21 21
5
Chapter 1
Overview........................................................................................................25
Network deployment alternatives.................................................................................25
Virtual private networking.............................................................................................26
Licensing features ....................................................................................................... 27
Command line interface................................................................................................28
Federal Information Processing Standard (FIPS) .......................................................28
Nortel VPN Router Configuration — Basic Features
6 Contents
Chapter 2
Getting started...............................................................................................29
IP addressing............................................................................................................... 29
Management virtual address ......................................................................................31
Multinetting...................................................................................................................38
Changing the management IP address.......................................................................41
Restricting source IPs access to management ...........................................................44
Configuring the serial interface ....................................................................................45
Using boot modes ........................................................................................................50
Managing through a Web browser...............................................................................50
Preparing for configuration...........................................................................................52
Welcome window..........................................................................................................56
Chapter 3 Setting up the Nortel VPN Router 1010, 1050, and 1100
Configuring MVA with the serial menu...................................................................34
Configuring Interfaces............................................................................................36
Configuring ACL through the CLI: .........................................................................44
Accessing ACL through the GUI:...........................................................................45
...........................
59
Default configuration ................................................................................................... 59
Branch office quick start utility.....................................................................................61
Compact flash disk.......................................................................................................72
NN46110-500
Enterprise environment..........................................................................................62
Service provider environment ...............................................................................63
Deployment procedure
Branch office quick start template..........................................................................67
Connecting for Internet access .............................................................................67
Before you begin.............................................................................................67
Check that you received the following items...................................................67
Cable the VPN Router and turn the power on Make sure that your PCs can obtain IP addresses automatically
Test the VPN Router and start the quick-start tool .........................................69
DHCP instructions...........................................................................................70
PPPoE instructions..........................................................................................70
Static IP instructions.......................................................................................71
.........................................................................................
................................................
..................
65
68 69
Contents 7
Chapter 4
Configuring user tunnels.............................................................................75
Configuring group characteristics ................................................................................78
Setting up user tunnels ...............................................................................................81
Configuring inverse split tunneling...............................................................................85
Inverse split tunneling ...........................................................................................87
Using the 0.0.0.0/0 subnet wildcard ...............................................................87
Configuring the subnet wildcard .....................................................................87
Configuring tunneling modes using the CLI...........................................................89
Chapter 5
Configuring the system...............................................................................91
Configuring the system identity ...................................................................................91
Setting up LAN interfaces ............................................................................................93
Edit LAN Interface window .............................................................................95
Multinetting...................................................................................................................97
Configuring multinetting using the CLI.................................................................100
Adding an IP address ...................................................................................100
Deleting an IP address .................................................................................100
Asynchronous data over TCP ....................................................................................105
Configuring Network Time Protocol (NTP).................................................................106
Configuring system settings.......................................................................................108
Using proxy ARP .......................................................................................................111
Using the SSH server to allow secure sessions
Using the GUI for SSH server..............................................................................112
Enabling the SSH server...............................................................................112
Configuring the SSH server ..........................................................................113
Using the CLI for SSH server
Defining an SSH server (CLI) .......................................................................115
Enabling or restarting the SSH server Displaying the current settings for the SSH server
Disabling the SSH server .............................................................................116
Restricted product - export license requirement
.............................................................................
.........................................................
.........................................................
.......................................
.......................................................
112
115
115
116
117
Nortel VPN Router Configuration — Basic Features
8 Contents
Chapter 6 Configuring branch office tunnels
PPTP nested tunnels..................................................................................................123
DNS for branch office tunnel endpoints
Configuring a branch office
Sample branch office configuration ...........................................................................133
Chapter 7
Configuring control tunnels........................................................................137
Control tunnel types....................................................................................................138
Creating control tunnels.............................................................................................141
Creating a user control tunnel from the serial interface
............................................................
.....................................................................
VPN DNS.............................................................................................................124
Round Robin DNS...............................................................................................125
Dynamic DNS ..................................................................................................... 127
.......................................................................................
Adding a group ....................................................................................................130
Adding a tunnel ................................................................................................... 130
Configuring a tunnel connection .........................................................................131
Sample branch office procedure .........................................................................135
Restricted mode ..................................................................................................140
Nailed-up control tunnels.....................................................................................140
Adding a group ....................................................................................................142
Adding a control tunnel .......................................................................................143
Configuring a control tunnel connection
.............................................................
..............................................
119
124
128
144
146
Chapter 8
Configuring IPSec mobility and persistent mode....................................147
IPSec mobility on Nortel VPN Router
NN46110-500
.......................................................................
Roaming performance factors.............................................................................149
Logging and status for clients and servers ..........................................................149
IPSec mobility and NAT.......................................................................................150
Roaming from behind NAT to behind NAT
Roaming from behind NAT to no NAT..........................................................151
Roaming from no NAT to behind NAT..........................................................151
IPSec mobility in NAT environment
..............................................................
...................................................
149
150
152
Contents 9
Routing table changes.........................................................................................152
Initial contact payload (ICP).................................................................................153
Maximum roaming time
Persistent tunneling ...................................................................................................155
Session persistence time.....................................................................................155
Configuring IPSec mobility and persistence ..............................................................156
Configuring IPSec mobility ..................................................................................156
.......................................................................................
154
Appendix A
Branch office quick start template............................................................163
Glossary.......................................................................................................165
Index.............................................................................................................173
Nortel VPN Router Configuration — Basic Features
10 Contents
NN46110-500

Figures

Figure 1 Typical PDN ..............................................................................................26
Figure 2 VPN service models...................................................................................27
Figure 3 Sample IP addressing scheme..................................................................30
Figure 4 MVA on separate subnet from private physical interfaces
Figure 5 MVA on same subnet as private physical interface ..................................33
Figure 6 MVA managing from a remote PC ............................................................33
Figure 7 Deployment Scenario................................................................................41
Figure 8 Default configuration..................................................................................60
Figure 9 Tunnel connection configuration................................................................75
Figure 10 Inverse Split Tunneling Figure 11 Inverse Split Tunneling Figure 12 Edit > IPsec page for wildcard Figure 13 LAN-to-Nortel VPN Router connection
Figure 14 LAN > Interfaces window ..........................................................................98
Figure 15 LAN Interfaces > Add IP Address window ................................................99
Figure 16 Asynchronous data over TCP..................................................................105
Figure 17 SSH Server..............................................................................................112
Figure 18 Allowed Services window.........................................................................114
Figure 19 Typical branch office environment ..........................................................120
Figure 20 Branch-to-branch with a firewall and a router Figure 21 Indirectly connected branch offices
Figure 22 VPN DNS ................................................................................................125
Figure 23 Failover example......................................................................................126
Figure 24 Load balancing example..........................................................................127
Figure 25 Setting up a branch office configuration Figure 26 Sample branch office configuration Figure 27 Branch office control tunnel Figure 28 Sample control tunnel environment Figure 29 Example configuration
.......................
.............................................................................
.............................................................................
..................................................................
......................................................
.........................................
........................................................
..................................................
........................................................
....................................................................
........................................................
............................................................................
11
32
85 86 88 93
121
122
129 134 138 139 148
Nortel VPN Router Configuration — Basic Features
12 Figures
Figure 30 Roaming from behind NAT to behind NAT Figure 31 Roaming from behind NAT to no NAT
.............................................
....................................................
150
151
Figure 32 Groups edit IPSec window.......................................................................157
NN46110-500

Tables

13
Table 1 Sample IP addressing associations Table 2 Services supported on a multinetted interface
Table 3 Web interface configuration options..........................................................53
Table 4 Configuration checklist
Table 5 Subnet assignments..................................................................................63
Table 6 BOQS parameters ....................................................................................66
Table 7 Split tunneling mode options
Table 8 Adding/Deleting a secondary address ....................................................100
Table 9 Configuring OSPF over a secondary address Table 10 Configuring RIP over a secondary address
Table 11 Configuration considerations ..................................................................152
.............................................................................
.........................................................
..........................................
....................................................................
.......................................
...........................................
30 39
53
88
101
102
Nortel VPN Router Configuration — Basic Features
14 Tables
NN46110-500

Preface

This guide introduces the Nortel VPN Router. It also provides overview and basic configuration information to help you initially set up your Nortel VPN Router.

Before you begin

This guide is for network managers who are responsible for setting up and configuring the Nortel VPN Router. This guide assumes that you have experience with windowing systems or graphical user interfaces (GUIs) and familiarity with network management.

Text conventions

This guide uses the following text conventions:
15
angle brackets (< >)
bold Courier text
Indicate that you choose the text to enter based on the description inside the brackets. Do not type the brackets when entering the command.
Example: If the command syntax is
ping <ip_address>, you enter ping 192.32.10.12
Indicates command names and options and text that you need to enter.
Example: Use the show health command. Example: Enter terminal paging {off | on}.
Nortel VPN Router Configuration — Basic Features
16 Preface
braces ({})
brackets ([ ])
ellipsis points (. . . )
Indicate required elements in syntax descriptions where there is more than one option. You must choose only one of the options. Do not type the braces when entering the command.
Example: If the command syntax is ldap-server
source {external | internal}, you must enter
either ldap-server source external or
ldap-server source internal, but not both.
Indicate optional elements in syntax descriptions. Do not type the brackets when entering the command.
Example: If the command syntax is
show ntp [associations], you can enter
either show ntp or show ntp associations. Example: If the command syntax is default rsvp
[token-bucket {depth | rate}], you can enter default rsvp, default rsvp token-bucket depth, or default rsvp token-bucket rate.
Indicate that you repeat the last element of the command as needed.
Example: If the command syntax is
more diskn:<directory>/...<file_name>,
you enter more and the fully qualified name of the file.
NN46110-500
italic text
plain Courier text
Indicates new terms, book titles, and variables in command syntax descriptions. Where a variable is two or more words, the words are connected by an underscore.
Example: If the command syntax is
ping <ip_address>, ip_address is one variable
and you substitute one value for it. Indicates system output, for example, prompts and
system messages. Example: File not found.
Preface 17

Acronyms

separator ( > )
vertical line ( | )
This guide uses the following acronyms:
ACK CA CHAP CRL DN
Shows menu paths. Example: Choose Status > Health Check.
Separates choices for command keywords and arguments. Enter only one of the choices. Do not type the vertical line when entering the command.
Example: If the command syntax is
terminal paging {off | on}, you enter either terminal paging off or terminal paging on,
but not both.
acknowledgement certificate authority Challenge Handshake Authentication protocol certificate revocation list
distinguished name DNS FIPS FTP IP IKE ISAKMP
ISP L2TP LDAP LAN MAC
domain name system
Federal Information Processing Standards
File Transfer Protocol
Internet Protocol
IPsec Key Exchange
Internet Security Association and Key Management
Protocol
Internet service provider
Layer2 Tunneling Protocol
Lightweight Directory Access Protocol
local area network
media access control address
Nortel VPN Router Configuration — Basic Features
18 Preface
NAT network address translation NOC
network operations center NTP Network Time Protocol NVR Nortel VPN Router OSPF
Open Shortest Path First OSS operations support systems PAP
Password Authentication Protocol PDN public data networks POP
point-of-presence PPP Point-to-Point Protocol PPTP Point-to-Point Tunneling Protocol RSVP Resource Reservation Protocol RIP Routing Information Protocol SNMP UDP URL
Simple Network Management Protocol
User Datagram Protocol
uniform resource locator VPN virtual private network VRRP
Virtual Router Redundancy Protocol
NN46110-500
WAN wide area network

Related publications

For more information about the Nortel VPN Router, refer to the following publications:
Release notes provide the latest information, including brief descriptions of the new features, problems fixed in this release, and known problems and workarounds.
Nortel VPN Router ConfigurationSSL VPN Services provides instructions for configuring services on the Nortel SSL VPN Module 1000, including authentication, networks, user groups, and portal links.
Nortel VPN Router SecurityServers, Authentication, and Certificates provides instructions for configuring authentication services and digital certificates.
Nortel VPN Router Security — Firewalls, Filters, NAT, and QoS provides instructions for configuring the Nortel VPN Router Stateful Firewall and Nortel VPN Router interface and tunnel filters.
Nortel VPN Router ConfigurationAdvanced Features provides instructions for configuring advanced LAN and WAN settings, PPP, frame relay, PPPoE, ADSL and ATM, T1CSU/DSU, dial services and BIS, DLSw, IPX, and SSL VPN.
Nortel VPN Router SecurityTunneling Protocols configuration information for the tunneling protocols IPsec, L2TP, PPTP, and L2F.
Nortel VPN Router ConfigurationRouting provides instructions for configuring RIP, OSPF, and VRRP, as well as instructions for configuring ECMP, routing policy services, and client address redistribution (CAR).
Nortel VPN Router Troubleshooting provides information about system administrator tasks such as backup and recovery, file management, and upgrading software, and instructions for monitoring VPN Router status and performance. Also, provides troubleshooting information and inter operability considerations.
Nortel VPN Router Using the Command Line Interface provides syntax, descriptions, and examples for the commands that you can use from the command line interface.
Nortel VPN Router Configuration —TunnelGuard provides information about configuring and using the TunnelGuard feature.
Preface 19
Nortel VPN Router Configuration — Basic Features
20 Preface

Hard-copy technical manuals

You can print selected technical manuals and release notes free, directly from the Internet. Go to the www.nortel.com/support URL. Find the product for which you need documentation. Then locate the specific category and model or version for your hardware or software product. Use Adobe* Acrobat Reader* to open the manuals and release notes, search for the sections you need, and print them on most standard printers. Go to Adobe Systems at the download a free copy of the Adobe Acrobat Reader.

How to get Help

This section explains how to get help for Nortel products and services.

Finding the latest updates on the Nortel Web site

The content of this documentation was current at the time the product was released. To check for updates to the latest documentation and software for Nortel VPN Router, click one of the following links:
www.adobe.com URL to

Getting help from the Nortel Web site

NN46110-500
Link to
Latest software Latest documentation
The best way to get technical support for Nortel products is from the Nortel Technical Support Web site:
www.nortel.com/support
This site provides quick access to software, documentation, bulletins, and tools to address issues with Nortel products. From this site, you can:
• download software, documentation, and product bulletins
Takes you directly to the
Nortel page for Nortel VPN Router software. Nortel page for Nortel VPN Router documentation.
Preface 21
search the Technical Support Web site and the Nortel Knowledge Base for answers to technical issues
sign up for automatic notification of new software and documentation for Nortel equipment
open and manage technical support cases

Getting help over the phone from a Nortel Solutions Center

If you do not find the information you require on the Nortel Technical Support Web site, and you have a Nortel support contract, you can also get help over the phone from a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the following web site to obtain the phone number for your region:
www.nortel.com/callus

Getting help from a specialist by using an Express Routing Code

To access some Nortel Technical Solutions Centers, you can use an Express Routing Code (ERC) to quickly route your call to a specialist in your Nortel product or service. To locate the ERC for your product or service, go to:
www.nortel.com/erc

Getting help through a Nortel distributor or reseller

If you purchased a service contract for your Nortel product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller.
Nortel VPN Router Configuration — Basic Features
22 Preface
NN46110-500

New in this release

The following sections details what is new in Nortel VPN Router Configuration ­Basic Features for Release 7.0.

Network Time Protocol (NTP) support for Daylight Savings Time 2007 change

Systemlog lifetime or disk size limit usage option
FTP server passive mode parameter
Source IPs access restriction to management
SSH server configurations

Features

See the following sections for information about feature changes:
23
Network Time Protocol (NTP) support for Daylight Savings
Time 2007 change
NTP supports the 2007 Daylight Savings Time change in the United States and various Canadian provinces. In 2007, Daylight Savings Time begins at 2 a.m. on the second Sunday in March and ends at 2 a.m. on the first Sunday in November.
For more information about NTP support for Daylight Savings Time, see “Configuring Network Time Protocol (NTP)” on page 106.
Nortel VPN Router Configuration — Basic Features
24 New in this release

Systemlog lifetime or disk size limit usage option

VPN Router allows you to choose between setting a log file disk size limit or a log file lifetime for the Systemlog. Previous versions of the VPN Router only allowed the Systemlog to have a lifetime specified (default 60 days).
For more information about the Systemlog lifetime and disk size limit option, see Step

FTP server passive mode parameter

There is a new check box called disk size limitfound in System > Settings in the Router Settings section.
By enabling this parameter, you allow passive FTP connections to connect to the unit, perform directory listings, and upload and download files. If this check box is not enabled, you can still use passive FTP connections to connect to the unit, but you cannot perform directory listings or upload and download files.
For more information about the FTP server passive mode parameter, see Step 7 in “Configuring system settings” on page 108.
5 in “Configuring system settings” on page 108.
NN46110-500

Source IPs access restriction to management

This release enables an administrator to have more control over management services by restricting source IPs connections for management purposes through Access Lists (ACL). For more information about Source IPs access restriction to management, see
“Restricting source IPs access to management” on page 44.

SSH server configurations

You can now enable an SSH server to allow secure CLI sessions, such as telnet, to the NVR. You can enable the private and public interface filters, set the port for the SSH server, and restart the server. You can use either the NVR GUI or CLI to configure the SSH server. For more information about SSH server configurations, see
“Using the SSH server to allow secure sessions” on page 112.

Chapter 1 Overview

This chapter introduces the Nortel VPN Router. The Nortel VPN Router is a family of products that deliver security and IP services in a single integrated platform. With IP routing, Virtual Private Networking (VPN), stateful firewall, policy management and QoS services, a single Nortel VPN Router device offers the IP services that normally require multiple purpose devices. Designed for enterprise networks, the Nortel VPN Router leverages the cost advantages of the Internet while providing secure communications across the public IP infrastructure.
As a highly scalable device, the Nortel VPN Router can address the security and IP services needs of the smallest branch site or largest headquarters environment. A Nortel VPN Router can be installed as an IP access router or stateful packet firewall.
The Nortel VPN Router incorporates Nortel’s Secure Routing Technology (SRT). SRT is a software framework that provides a security structure through all Nortel VPN Router operational components, including IP routing, VPN, firewall, and policy services. This allows for management consistency and scalable performance even when running multiple IP services in the same device. SRT also provides dynamic routing (RIP/OSPF) over secure IPsec tunnels, uniform security policies across VPN, routing, and firewall services and a flexible software licensing scheme.
25

Network deployment alternatives

With its combination of secure, manageable, and scalable features, you can shift information technology resources from solving the current remote user access problems to other, more proactive administrative and management areas. And you can eliminate modem-management pool problems from your organization and shift them to your Nortel VPN Router provider.
Nortel VPN Router Configuration — Basic Features
26 Chapter 1 Overview
Nortel VPN Router access allows remote users to dial in to an Internet Service Provider (ISP) anywhere and reach corporate headquarters or branch offices. The Nortel VPN Router provides remote users access to corporate databases, mail servers, and file servers.
Figure 1 Typical PDN
The Nortel VPN Router allows ISPs to take over the role of point-of-presence (POP) providers of modem access. It improves performance while lowering overhead, which translates to significant corporate savings.
Figure 1 shows a typical packet data network (PDN).
Virtual private networking
A VPN is a private data communication channel that uses a public IP network as the basic transport for connecting corporate data centers, remote offices, mobile employees, telecommuters, customers, suppliers, and business partners. Physically discontiguous networks are made to appear logically connected and contiguous.
A remote access VPN service requires the creation and operation of a secure tunnel between client software on a remote device, such as a PC, and host software on a Nortel VPN Router.
Figure 2 on page 27 shows examples of VPN services.
NN46110-500
Chapter 1 Overview 27
Figure 2 VPN service models
The Nortel VPN Router uses a combination of authorization, authentication, privacy, and access control for each user.
Licensing features
Licence keys can be obtained through Nortel’s customer support. The Nortel VPN Router provides several license key options:
Advanced Routing Nortel VPN Router Stateful Firewall VPN Tunnels Premium DSLw BGP only
The Advanced Routing License key must be installed to enable OSPF on the Nortel VPN Router. (The Firewall License Key is required only when the redistribution capabilities of RIP and OSPF are necessary).
Nortel VPN Router Configuration — Basic Features
28 Chapter 1 Overview
The Nortel VPN Router Stateful Firewall License key must be installed to enable the Nortel VPN Router Stateful firewall.
Tunnel keys are specific to the Nortel VPN Router hardware model that you are
using. Nortel VPN Router switches are manufactured to allow either access to the maximum number of tunnels (VPN bundle) or support for 5 tunnels (Base Unit). This feature offers reduced cost for users who want fewer tunnels. The existing VPN bundle does not add a cost increase nor a need for a tunnel license key.
Note: It is only necessary to install a key once on each Nortel VPN Router. To enter the license key, go to the Admin > Install screen. You must reboot the Nortel VPN Router to gain access to the new tunnel limit.

Command line interface

The command line interface allows you to make configuration changes to the Nortel VPN Router via Telnet. You can access the command line interface by initiating a Telnet session to the Nortel VPN Router management IP address. For further information, see Nortel VPN Router Using the Command Line Interface .

Federal Information Processing Standard (FIPS)

You must separately order, purchase, and implement a FIPS kit to be FIPS compliant. This kit contains detailed documentation concerning setting up, operating, and configuring the Nortel VPN Router to be FIPS compliant. The FIPS kit also includes tamper-resistant labels to be put on the hardware as instructed in the FIPS kit documentation.
NN46110-500

Chapter 2 Getting started

This chapter describes methods for configuring and managing the Nortel VPN Router .
Note: If you are setting up a Nortel VPN Router 1010, 1050 or 1100,
see Chapter 3, “Setting up the Nortel VPN Router 1010, 1050, and
1100.” These VPN Routers have unique set up and configuration
considerations.
Full details on hardware installation, including adding local area network (LAN) or wide area network (WAN) cards, are in the Getting Started or installation guide that came with the Nortel VPN Router. You should complete the hardware installation before starting this chapter.
29

IP addressing

Figure 3 on page 30 shows sample IP address assignments in a network using a Nortel VPN Router. Refer to
Table 1 on page 30 to see the IP address associations.
Nortel VPN Router Configuration — Basic Features
30 Chapter 2 Getting started
Figure 3 Sample IP addressing scheme
NN46110-500
Table 1 Sample IP addressing associations
IP address Description (when applicable, where configured)
192.168.43.6 Dial-up networking to ISP (Internet access, ISP assigned)
192.19.2.30 Public default Internet VPN Router
192.19.2.33 Public LAN port IP address (remote user destination address)
192.19.2.32 Firewall public network address
10.2.3.2 Nortel VPN Router management IP address: System > Identity
10.2.3.3 Nortel VPN Router private LAN interface IP address: System > LAN Edit IP address
10.2.3.4 Private network default VPN Router: System > Routing Add/Edit Default Route
10.2.3.6 Sample partners FTP server for inventory and price list
10.2.3.7 Firewall private network address
10.2.3.8 DHCP server IP address
10.2.1.1 to
10.2.1.254
172.19.2.30 ISP-assigned address
Private Network Addresses Assigned to Remote Tunnel Sessions: DHCP pool: Servers > User IP Addr
Loading...
+ 148 hidden pages