Manualsbrain.com
ru
English
Deutsch
Español
Français
Italiano
Português
조선말, 한국어
日本語
中文
Инструкции и руководства
Бренды
Cisco
Cisco Packet Data Gateway (PDG)
для Cisco Cisco Packet Data Gateway (PDG)
Скачать
Нравится
На весь экран
Стандартный
Страница
из
173
Перейти
IPSec Reference, StarOS Release 18 ▄
iii
CONTENTS
About this Guide ................................................................................................ ix
Conventions Used .................................................................................................................................... x
Supported Documents and Resources ....................................................................................................xi
Related Common Documentation ....................................................................................................... xi
Related Product Documentation ..................................................................................................... xi
Contacting Customer Support ................................................................................................................. xii
Introduction to IP Security (IPSec) .................................................................. 13
Overview ................................................................................................................................................. 14
IPSec AH and ESH ............................................................................................................................ 14
IPSec Transport and Tunnel Mode .................................................................................................... 14
Security Associations (SAs) and Child SAs ....................................................................................... 14
Anti-Replay (IKEv2) ............................................................................................................................ 15
IPSec Applications ............................................................................................................................. 15
IPSec Terminology ................................................................................................................................. 17
Crypto Access Control List (ACL) ...................................................................................................... 17
Transform Set ..................................................................................................................................... 17
ISAKMP Policy ................................................................................................................................... 17
Crypto Map ......................................................................................................................................... 18
Manual Crypto Maps (IKEv1) ......................................................................................................... 18
IKEv2 Crypto Maps ........................................................................................................................ 18
Dynamic Crypto Maps (IKEv1) ...................................................................................................... 18
Crypto Template ................................................................................................................................. 19
IKEv1 versus IKEv2 ................................................................................................................................ 20
Boost Crypto Performance ..................................................................................................................... 21
IPSec to Product Feature Mapping ................................................................. 23
PDSN, FA and HA .................................................................................................................................. 24
GGSN, FA and HA ................................................................................................................................. 25
ASNGW, HeNBGW, HNBGW and HSGW ............................................................................................. 26
SCM ........................................................................................................................................................ 27
ePDG ...................................................................................................................................................... 27
MME, S-GW, P-GW and SAE-GW ......................................................................................................... 28
SecGW ................................................................................................................................................... 29
IPSec Network Applications ............................................................................ 31
Implementing IPSec for PDN Access Applications ................................................................................ 32
How IPSec-based PDN Access Configuration Works ....................................................................... 32
Configuring IPSec Support for PDN Access ...................................................................................... 33
Implementing IPSec for Mobile IP Applications...................................................................................... 34
How IPSec-based Mobile IP Configuration Works ............................................................................. 34
Configuring IPSec Support for Mobile IP ........................................................................................... 36
RADIUS Attributes for IPSec-based Mobile IP Applications .............................................................. 38
Implementing IPSec for L2TP Applications ............................................................................................ 39
How IPSec is Used for Attribute-based L2TP Configurations ............................................................ 39
Configuring Support for L2TP Attribute-based Tunneling with IPSec ................................................ 40
How IPSec is Used for PDSN Compulsory L2TP Configuration ........................................................ 41
Configuring Support for L2TP PDSN Compulsory Tunneling with IPSec .......................................... 42
Назад
Далее
1
2
3
4
5
…
173