CHAPTER 5. IPSEC258 © SAMSUNG Electronics Co., Ltd.Securely Managing the Ubigate iBG2016 SystemExampleThis example demonstrates how to manage a router through an IP securitytunnel. Steps are presented for configuring the Router and NW2 routers toassist any host on the LAN side of Networks-2 to manage the Router routerthrough the IP security tunnel.The security requirements are:y Phase 1: 3DES with SHA1y Phase 2: IPSec ESP with 128-bit AES and HMAC-SHA1Figure 5.1 Tunnel Mode Between Tow Security Gateways-Single Proposal1. Configure a WAN bundle of network type untrusted.Router/configure# interface bundle wan1Router/configure/interface/bundle wan1# link t1 0/2/0Router/configure/interface/bundle wan1# encapsulation pppRouter/configure/interface/bundle wan1# ip address172.16.0.1 24Router/configure/interface/bundle wan1# crypto untrustedRouter/configure/interface/bundle wan1# exit2. Configure the Ethernet interface with trusted network type.Router/configure# interface ethernet 0/1Router/configure interface/ethernet 0/1# ip address 10.0.1.124Router/configure/interface/ethernet(0/1)# crypto trustedRouter/configure/interface/ethernet(0/1)# exitRouter 1 Router 2IPSec ESPUNTRUSTEDTRUSTED TRUSTEDNetwork10.0.1.0/24Network10.0.2.0/24172.16.0.1 172.16.0.2