cc/td/doc/product/vpn/vpn3002/3_6
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Interfaces

Interfaces

This section of the VPN 3002 Hardware Client Manager applies functions that are interface-specific, rather than system-wide.

Configuration | Interfaces

You configure two network interfaces for the VPN 3002 to operate as a VPN device: the private interface and the public interface. If you used Quick Configuration as described in the VPN 3002 Hardware Client Getting Started manual, the system supplied many default parameters for the interfaces. Here you can configure them explicitly.

Configuring an Ethernet interface includes supplying an IP address and subnet mask, and setting speed and transmission mode.

The VPN 3002 includes some IP routing functions: static routes, DHCP, and PPPoE. You configure static routes, the default gateway, and DHCP in the IP Routing section; see the Configuration | System | IP Routing screens. PPPoE requires no further configuration than supplying a username and password in the Public Interface parameter.


Note   Interface settings take effect as soon as you apply them. If the system is in active use, changes might affect tunnel traffic.

The table on the Configuration | Interfaces screen shows all installed interfaces and their status.


Figure 3-1: VPN 3002 Configuration | Interfaces Screen


To configure a module, either click the appropriate link in the status table; or use the mouse pointer to select the module on the back-panel image, and click anywhere in the highlighted area.

Interface

The VPN 3002 interface installed in the system. To configure an interface, click the appropriate link.

Ethernet 1 (Private), Ethernet 2 (Public)

To configure Ethernet interface parameters, click the appropriate highlighted link in the table or click in a highlighted module on the back-panel image. See Configuration | Interfaces | Private/Public.

DNS Server(s)

To configure DNS Server(s), click the highlighted link in the table. See Configuration | System |
Servers | DNS.

DNS Domain Name

To configure DNS Server(s), click the highlighted link in the table. See Configuration | System |
Servers | DNS.

Status

The operational status of this interface:

IP Address

The IP address configured on this interface.

Subnet Mask

The subnet mask configured on this interface.

MAC Address

This is the unique hardware MAC (Media Access Control) address for this interface, displayed in 6-byte hexadecimal notation. You cannot change this address.

Default Gateway

The IP routing subsystem routes data packets first using static routes, then the default gateway. If you do not specify a default gateway, the system drops packets it cannot otherwise route.

To configure a default gateway, click the appropriate highlighted link in the table or click in a highlighted module on the back-panel image. See Configuration | System | IP Routing | Default Gateways.

Configuration | Interfaces | Private

This screen lets you configure parameters for the private interface. It displays the current parameters, if any.


Figure 3-2: Configuration | Interfaces | Private Screen



Caution   If you modify any parameters of the private interface that you are currently using to connect to the VPN 3002, you will break the connection, and you will have to restart the Manager from the login screen.

Disabled

To make the interface offline, click Disabled. This state lets you retain or change its configuration parameters.

If the interface is configured but disabled (offline), the appropriate Ethernet Link Status LED blinks green on the VPN 3002 front panel.

Static IP Addressing

To change the IP address of the private interface, click Static IP Addressing.

IP Address

Enter the IP address for this interface, using dotted decimal notation (for example, 192.168.12.34). Note that 0.0.0.0 is not allowed. Be sure no other device is using this address on the network.

Subnet Mask

Enter the subnet mask for this interface, using dotted decimal notation (for example 255.255.255.0). The Manager automatically supplies a standard subnet mask appropriate for the IP address you just entered. For example, the IP address 192.168.12.34 is a Class C address, and the standard subnet mask is 255.255.255.0. You can accept this entry or change it. Note that 0.0.0.0 is not allowed.

MAC Address

This is the unique hardware MAC (Media Access Control) address for this interface, displayed in 6-byte hexadecimal notation. You cannot change this address.

Speed

click the drop-down menu button and select the interface speed:

Duplex

Click the drop-down menu button and select the interface transmission mode:

MTU

Enter the Maximum Transmission Unit for the interface. The range is 68 through 1500.

Apply/Cancel

To apply your settings to the system and include them in the active configuration, click Apply. The Manager returns to the Configuration | Interfaces screen.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your settings, click Cancel. The Manager returns to the Configuration | Interfaces screen.

Configuration | Interfaces | Public

This screen lets you select a connection method—DHCP, PPPoE, or static IP addressing—for the public interface. It also allows you to disable the public interface.


Figure 3-3: Configuration | Interfaces | Public Screen


Disabled

To make the interface offline, click Disabled. This state lets you retain or change its configuration parameters.

DHCP Client

click this radio button if you want to obtain the IP address and subnet mask for this interface via DHCP. If you click this button, you do not make entries in the IP address and subnet mask parameters that follow.

PPPoE Client

click this radio button if you want to connect using PPPoE. If you select PPPoE, you do not make entries in the static IP addressing parameters that follow.

PPPoE User Name

If you have selected PPPoE, enter a valid PPPoE username.

PPPoE Password

If you have selected PPPoE, enter the PPPoE password for the username you entered above.

Verify PPPoE Password

If you have selected PPPoE, enter the PPPoE password again to verify it.

Static IP Addressing

click this radio button if you want to use a static IP address.

IP Address

If you are using static IP addressing, enter the IP address for this interface, using dotted decimal notation (for example, 192.168.12.34). Note that 0.0.0.0 is not allowed. Be sure no other device is using this address on the network.

Subnet Mask

If you are using static IP addressing, enter the subnet mask for this interface, using dotted decimal notation (for example, 255.255.255.0). The Manager automatically supplies a standard subnet mask appropriate for the IP address you just entered. For example, the IP address 192.168.12.34 is a Class C address, and the standard subnet mask is 255.255.255.0. You can accept this entry or change it. Note that 0.0.0.0 is not allowed.

MAC Address

This is the unique hardware MAC (Media Access Control) address for this interface, displayed in 6-byte hexadecimal notation. You cannot change this address.

Speed

If you are using static IP addressing, click the drop-down menu button and select the interface speed:

Duplex

If you are using static IP addressing, click the drop-down menu button and select the interface transmission mode:

MTU

Enter the Maximum Transmission Unit (MTU) for the interface. The range is 68 through 1500.

IPSec Fragmentation Policy

The IPSec fragmentation policy specifies how to treat packets that exceed the MTU setting when tunneling traffic through the public interface. This feature provides a way to handle cases where a router or NAT device between the VPN 3002 and the VPN Concentrator rejects or drops IP fragments. For example, suppose a PC behind a VPN 3002 wants to FTP put a large file to an FTP server behind a VPN Concentrator. The PC transmits packets that when encapsulated would exceed the VPN 3002's MTU size on the public interface. The following options determine how the VPN 3002 processes these packets.

The fragmentation policy you set here applies to all traffic travelling out the VPN 3002 public interface to VPN Concentrators. The second and third options described below may affect performance rates.

Do not fragment prior to IPSec encapsulation; fragment prior to interface transmission

The VPN 3002 encapsulates all tunneled packets. After encapsulation, the VPN 3002 fragments packets that exceed the MTU setting before transmitting them through the public interface. This option works for situations where fragmented packets are allowed through the tunnel without hindrance. For the FTP example, large packets are encapsulated and then fragmented at the IP layer. Intermediate devices may drop fragments or just out-of-order fragments. Load-balancing devices can introduce out-of-order fragments.

Fragment prior to IPSec encapsulation with Path MTU Discovery (ICMP)

The VPN 3002 fragments tunneled packets that would exceed the MTU setting during encapsulation. For this option, the VPN 3002 drops large packets that have the Don't Fragment (DF) bit set, and sends an ICMP message "Packet needs to be fragmented but DF is set" to the packet's initiator. The ICMP message includes the maximum MTU size allowed. Path MTU Discovery means that an intermediate device (in this case the VPN 3002) informs the source of the MTU permitted to reach the destination.

If a large packet does not have the DF bit set, the VPN 3002 fragments prior to encapsulating, thus creating two independent non-fragmented IP packets, and transmits them out the public interface. This is the default policy for the VPN 3002 hardware client.

For this example, the PC that is the FTP client may use Path MTU Discovery to adjust the size of the packets it transmits to this destination.

Fragment prior to IPSec encapsulation without Path MTU Discovery (Clear DF bit)

The VPN 3002 fragments tunneled packets that exceed the MTU setting before encapsulating them. If the DF bit on these packets is set, the VPN 3002 clears the DF bit, fragments the packets, and then encapsulates them. This action creates two independent non-fragmented IP packets leaving the public interface and successfully transmits these packets to the peer site by turning the fragments into complete packets to be reassembled at the peer site.

In our example, the VPN 3002 overrides the MTU and allows fragmentation by clearing the DF bit.

Apply / Cancel

To apply your settings to this interface and include your settings in the active configuration, click Apply. The Manager returns to the Configuration | Interfaces screen.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your settings, click Cancel. The Manager returns to the Configuration | Interfaces screen.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Oct 29 11:42:41 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.