Nokia IP380 Installation Guide - Page 80

Configuring Software to Use Hardware Acceleration

Page 80 highlights

6 Installing and Replacing Other Components Configuring Software to Use Hardware Acceleration Use Network Voyager to configure virtual private network (VPN) tunnels to use hardware acceleration. This step is necessary for both the built-in hardware accelerators and for the optional encryption accelerator card on the IP380 appliance. The way you enable the software depends on whether you create VPN tunnels with Network Voyager or with Check Point software. If you use Network Voyager to create a VPN tunnel, see "To configure IPsec" on page 72. If you use Check Point software to create a VPN tunnel, see "To configure Check Point VPN" on page 72. To configure IPsec 1. Start Nokia Network Voyager for your appliance. 2. On the Network Voyager home page, click Config. 3. Under Interfaces, click IPSec. 4. Scroll down and click IPSec Advanced Configuration. 5. At Hardware Device Configuration, click On. 6. Click Apply to enable the card. To configure Check Point VPN 1. Start Nokia Network Voyager for your appliance. 2. On the Network Voyager home page, click Config. 3. Scroll down to Security and Access Configuration and click Cryptographic Hardware Acceleration. 4. At Hardware Device Configuration, click On. 5. Click Apply to enable the card. You can also monitor Nokia encryption accelerator card interfaces by using Nokia Network Voyager. For more information about accessing Nokia 72 Nokia IP300 Series Security Platform Installation Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130

6
Installing and Replacing Other Components
72
Nokia IP300 Series Security Platform Installation Guide
Configuring Software to Use Hardware
Acceleration
Use Network Voyager to configure virtual private network (VPN) tunnels to
use hardware acceleration. This step is necessary for both the built-in
hardware accelerators and for the optional encryption accelerator card on the
IP380 appliance.
The way you enable the software depends on whether you create VPN tunnels
with Network Voyager or with Check Point software. If you use Network
Voyager to create a VPN tunnel, see
“To configure IPsec”
on page 72. If you
use Check Point software to create a VPN tunnel, see
“To configure Check
Point VPN”
on page 72.
To configure IPsec
1.
Start Nokia Network Voyager for your appliance.
2.
On the Network Voyager home page, click Config.
3.
Under Interfaces, click IPSec.
4.
Scroll down and click IPSec Advanced Configuration.
5.
At Hardware Device Configuration, click On.
6.
Click Apply to enable the card.
To configure Check Point VPN
1.
Start Nokia Network Voyager for your appliance.
2.
On the Network Voyager home page, click Config.
3.
Scroll down to Security and Access Configuration and click
Cryptographic Hardware Acceleration.
4.
At Hardware Device Configuration, click On.
5.
Click Apply to enable the card.
You can also monitor Nokia encryption accelerator card interfaces by using
Nokia Network Voyager. For more information about accessing Nokia