
GORAMO – Janusz Górecki
MultiLink Router and MikroRouter
www.goramo.com.pl
age 40 from 41
7.1.3 Configuration "other" side tunnel
For the configuration described above - fits symmetric configuration, as described below:
7.1.4 Additional information on the implementation of VPN
To implement a VPN router uses an IPSec-tools package and its composition falls within the
setkey tool. This tool is used for the compilation of the tunnel and accessible from the command line
router. The current implementation only supports manual key exchange.
To check whether the tunnel works correctly, you can log into the router and send control packets
(ping), first to the gate on the other side, then to the computers in local area networks.
Connection status can be monitored on the tab with a list of pre-configured tunnel (Field State
- if it is to Enabled, the tunnel is working properly, Disabled - indicates that the tunnel is switched off
or not tabulated).
Summary of the tunnel, you can check the command "setkey" (a detailed description of commands
available on the Internet), call:
setkey –DP
This command writes a rule that configures a tunnel, and how much to use different rules (increasing
volume of use shows that the router attempts to use the tunnel).
In case of troubles we suggest to see:
• SPI numbers match
• Key format
• IP addresses
• Web addresses whether they are in the correct format: xxx.xxx.xxx.xxx/yy
• LAN on different sides of a tunnel must have different IP addresses.
Kommentare zu diesen Handbüchern