Manualsbrain.com
pt
English
Deutsch
Español
Français
Italiano
Русский
조선말, 한국어
日本語
中文
Manuais
Marcas
Foundry Networks
AR1216
Manual Do Utilizador
Foundry Networks AR1216 Manual Do Utilizador
Download
Gosto
Ecrã completo
Padrão
Página
de
293
Ir
Contents
June 2004
© 2004 Foundry Networks, Inc.
ix
G
ENERIC
R
OUTING
E
NCAPSULATION
(GRE) ..............................................................................................14-7
C
HAPTER
15
S
ECURITY
F
EATURES
................................................................................
15-1
I
NTRODUCTION
TO
S
ECURITY
....................................................................................................................15-1
E
NABLING
S
ECURITY
F
EATURES
.........................................................................................................15-1
S
ECURING
R
EMOTE
A
CCESS
U
SING
IPS
EC
VPN .......................................................................................15-2
A
CCESS
M
ETHODS
.............................................................................................................................15-2
E
XAMPLE
1: S
ECURELY
M
ANAGING
THE
F
OUNDRY
AR1204 O
VER
AN
IPS
EC
T
UNNEL
..........................15-3
E
XAMPLE
2: J
OINING
T
WO
P
RIVATE
N
ETWORKS
WITH
AN
IP S
ECURITY
T
UNNEL
.................................15-10
E
XAMPLE
3: J
OINING
T
WO
N
ETWORKS
WITH
AN
IPS
EC
T
UNNEL
USING
M
ULTIPLE
IPS
EC
P
ROPOSALS
.15-19
E
XAMPLE
4: S
UPPORTING
R
EMOTE
U
SER
A
CCESS
............................................................................15-28
E
XAMPLE
5: C
ONFIGURING
IPS
EC
R
EMOTE
A
CCESS
TO
C
ORPORATE
LAN
WITH
M
ODE
-C
ONFIGURATION
M
ETHOD
....................................................................................................................................15-37
C
ONFIGURING
GRE ................................................................................................................................15-45
F
IREWALLS
.............................................................................................................................................15-50
F
IREWALL
C
ONFIGURATION
E
XAMPLES
..............................................................................................15-50
S
TOPPING
D
O
S A
TTACKS
.................................................................................................................15-56
P
ACKET
R
EASSEMBLY
......................................................................................................................15-57
NAT C
ONFIGURATIONS
....................................................................................................................15-57
NAT C
ONFIGURATION
E
XAMPLES
.....................................................................................................15-58
S
ECURITY
P
ROTOCOL
D
EFAULTS
............................................................................................................15-61
IPS
EC
S
UPPORTED
P
ROTOCOLS
AND
A
LGORITHMS
...........................................................................15-61
F
OUNDRY
IKE
AND
IPS
EC
D
EFAULTS
...............................................................................................15-62
F
IREWALL
D
EFAULT
V
ALUES
...................................................................................................................15-63
T
UNNELING
D
EFAULT
V
ALUES
.................................................................................................................15-65
Anterior
Próximo
1
…
7
8
9
10
11
…
293