Foundry Networks AR1204 Manual de usuario Pagina 9

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 293
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 8
Contents
June 2004 © 2004 Foundry Networks, Inc. ix
GENERIC ROUTING ENCAPSULATION (GRE) ..............................................................................................14-7
CHAPTER 15
S
ECURITY FEATURES ................................................................................ 15-1
INTRODUCTION TO SECURITY ....................................................................................................................15-1
E
NABLING SECURITY FEATURES .........................................................................................................15-1
S
ECURING REMOTE ACCESS USING IPSEC VPN .......................................................................................15-2
A
CCESS METHODS .............................................................................................................................15-2
E
XAMPLE 1: SECURELY MANAGING THE FOUNDRY AR1204 OVER AN IPSEC TUNNEL ..........................15-3
E
XAMPLE 2: JOINING TWO PRIVATE NETWORKS WITH AN IP SECURITY TUNNEL .................................15-10
E
XAMPLE 3: JOINING TWO NETWORKS WITH AN IPSEC TUNNEL USING MULTIPLE IPSEC PROPOSALS .15-19
E
XAMPLE 4: SUPPORTING REMOTE USER ACCESS ............................................................................15-28
E
XAMPLE 5: CONFIGURING IPSEC REMOTE ACCESS TO CORPORATE LAN WITH MODE-CONFIGURATION
M
ETHOD ....................................................................................................................................15-37
C
ONFIGURING GRE ................................................................................................................................15-45
F
IREWALLS .............................................................................................................................................15-50
F
IREWALL CONFIGURATION EXAMPLES ..............................................................................................15-50
S
TOPPING DOS ATTACKS .................................................................................................................15-56
P
ACKET REASSEMBLY ......................................................................................................................15-57
NAT C
ONFIGURATIONS ....................................................................................................................15-57
NAT C
ONFIGURATION EXAMPLES .....................................................................................................15-58
S
ECURITY PROTOCOL DEFAULTS ............................................................................................................15-61
IPS
EC SUPPORTED PROTOCOLS AND ALGORITHMS ...........................................................................15-61
F
OUNDRY IKE AND IPSEC DEFAULTS ...............................................................................................15-62
F
IREWALL DEFAULT VALUES ...................................................................................................................15-63
T
UNNELING DEFAULT VALUES .................................................................................................................15-65
Vista de pagina 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 292 293

Comentarios a estos manuales

Sin comentarios