Black Box ET0100A Appliance Trim Kit User Manual


 
Complex Layer 3 Policy Example
EncrypTight User Guide 217
Using Network Sets B, B1, B2, and B3, create a hub and spoke policy for region B as shown in the
following table:
Using Network Sets C, C1, C2, and C3, create a hub and spoke policy for region C as shown in the
following table:
Using Network Sets D, D1, D2, and D3, create a hub and spoke policy for region D as shown in the
following table:
Table 58 Region B hub and spoke policy
Field Setting
Name Region B Hub and Spoke
Priority 901
Renew Keys/Refresh Lifetime 4 hours
Type IPSec
IPSec Encryption Algorithms - AES
Authentication Algorithms - HMAC-SHA-1
Key Generation By Network Set
Addressing Mode Override Preserve internal network addresses
Minimize Policy Size Disable
Hub Network Set B
Spokes Network Set B1
Network Set B2
Network Set B3
Protocol Any
Table 59 Region C hub and spoke policy
Field Setting
Name Region C Hub and Spoke
Priority 902
Renew Keys/Refresh Lifetime 4 hours
Type IPSec
IPSec Encryption Algorithms - AES
Authentication Algorithms - HMAC-SHA-1
Key Generation By Network Set
Addressing Mode Override Preserve internal network addresses
Minimize Policy Size Disable
Hub Network Set A
Spokes Network Set A1
Network Set A2
Network Set A3
Protocol Any
Table 60 Region D hub and spoke policy
Field Setting
Name Region D Hub and Spoke.