
viii
5.9.2 Client Configuration........................................................................ 63
5.9.3 Showing the IP Route Table......................................................... 63
5.10 ‡Configuring IPSec tunnels .................................................................. 64
5.10.1 Protocols and algorithms.............................................................. 65
5.10.2 IPSec tunnels ..................................................................................... 65
5.10.2.1 Creating an IPSec tunnel with pre-shared keys 66
5.10.2.2 Creating an IPSec tunnel with IKE 68
5.10.3 Logs....................................................................................................... 70
5.10.4 Diagnostics......................................................................................... 70
5.11 ‡Configuring SSH..................................................................................... 70
5.11.1 Access table entry............................................................................ 71
5.11.2 Operation............................................................................................ 71
5.11.3 Diagnostics......................................................................................... 72
5.12 TCP optimisation ..................................................................................... 72
5.12.1 How does PEP work? ...................................................................... 72
5.12.2 How to deploy PEP.......................................................................... 74
5.13 Configuring IP aggregates ............................................................. 74
5.13.1 Hardware configuration ................................................................ 74
5.13.2 Software configuration .................................................................. 75
5.13.3 Routing................................................................................................ 76
5.13.4 Keepalive/Clocking implications ................................................ 76
5.13.5 Bandwidth calculations.................................................................. 77
5.14 Setting up clocking for serial ports................................................... 77
5.14.1 Clock Hierarchy................................................................................. 78
5.14.2 Direction Conventions ................................................................... 78
5.14.3 Global Clocks..................................................................................... 78
5.14.4 Example ............................................................................................... 79
5.14.5 Terminal Timing................................................................................ 81
5.14.6 Phase-Locked Loops (PLLs) .......................................................... 82
5.14.7 Receive Clocks................................................................................... 82
5.14.8 Transmit Clocks ................................................................................ 83
5.15 Setting clocks on the Digital Voice card ......................................... 83