Enterasys ANG-3000 Uživatelská příručka Strana 26

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 414
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 25
Table of Contents
xxvi XSR-1805 Users Guide
Client...................................................................................................................... 255
Configuring OSPF with Fail Over ..................................................................... 256
Server 1.................................................................................................................. 256
Server 2.................................................................................................................. 256
Client...................................................................................................................... 256
Limitations............................................................................................................ 257
XSR VPN Features............................................................................................................... 258
VPN Configuration Overview .......................................................................................... 259
Master Key Generation ............................................................................................... 260
ACL Configuration Rules ........................................................................................... 261
Configuring ACLs ............................................................................................... 261
Selecting Policies: IKE/IPSec Transform-Sets.......................................................... 263
Security Policy Considerations .......................................................................... 264
Configuring Policy............................................................................................... 264
Creating Crypto Maps................................................................................................. 265
Configuring Crypto Maps .................................................................................. 265
Authentication, Authorization and Accounting Configuration ........................... 266
AAA Commands ................................................................................................. 266
Configuring AAA ................................................................................................ 267
PKI Configuration Options......................................................................................... 268
Configuring PKI................................................................................................... 269
PKI Certificate Enrollment Example ......................................................................... 269
Interface VPN Options ................................................................................................ 274
VPN Interface Sub-Commands.......................................................................... 274
Configuring a Simple VPN Site-to-Site Application...................................................... 275
Configuring the VPN Using EZ-IPSec ............................................................................. 278
Zobrazit stránku 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 413 414

Komentáře k této Příručce

Žádné komentáře