17
SmartWare Software Configuration Guide
Table of Contents
Configuring an H.323 VoIP connection .............................................................................................................348
Configuring a SIP VoIP connection ....................................................................................................................348
Activating CS context configuration....................................................................................................................349
Planning the CS context ...............................................................................................................................352
Configuring general CS settings ....................................................................................................................353
Configuring call routing ................................................................................................................................353
Configuring VoIP settings ............................................................................................................................355
Configuring BRI ports ..................................................................................................................................355
Configuring an H.323 VoIP connection .......................................................................................................356
Activating the CS context configuration ........................................................................................................356
Showing the running configuration ...............................................................................................................358
32 VPN configuration ...................................................................................................................................... 362
Introduction........................................................................................................................................................363
Authentication ..............................................................................................................................................363
Encryption ....................................................................................................................................................363
Transport and tunnel modes .........................................................................................................................364
Permanent IKE Tunnels ..........................................................................................................................364
Key management ..........................................................................................................................................364
VPN configuration task list .................................................................................................................................365
Creating an IPsec transformation profile .......................................................................................................365
Creating an IPsec policy profile .....................................................................................................................365
Creating/modifying an outgoing ACL profile for IPsec .................................................................................367
Configuration of an IP interface and the IP router for IPsec ..........................................................................368
Displaying IPsec configuration information ..................................................................................................368
Debugging IPsec ...........................................................................................................................................369
Key management (IKE).......................................................................................................................................370
Main differences between manual & IKE IPSEC configurations .............................................................370
Creating an ISAKMP transform profile ...................................................................................................371
Creating an ISAKMP IPSEC policy profile .............................................................................................372
Creating/modifying an outgoing ACL profile for IPSEC .........................................................................373
Configuration of an IP interface and the IP router for IPSEC .................................................................373
Policy matching ......................................................................................................................................373
Sample configuration snippet ..................................................................................................................373
Troubleshooting ...........................................................................................................................................374
Encrypted Voice - Performance considerations ....................................................................................................375
Performance considerations ...........................................................................................................................375
Enabling RTP encryption support.......................................................................................................................375
Using an alternate source IP address for specific destinations...............................................................................376
Sample configurations .........................................................................................................................................377
IPsec tunnel, DES encryption .......................................................................................................................377
SmartNode configuration ........................................................................................................................377
Cisco router configuration .......................................................................................................................378
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ..................378