Enterasys ANG-3000 Guide de l'utilisateur Page 26

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 414
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 25
Table of Contents
xxvi XSR-1805 Users Guide
Client...................................................................................................................... 255
Configuring OSPF with Fail Over ..................................................................... 256
Server 1.................................................................................................................. 256
Server 2.................................................................................................................. 256
Client...................................................................................................................... 256
Limitations............................................................................................................ 257
XSR VPN Features............................................................................................................... 258
VPN Configuration Overview .......................................................................................... 259
Master Key Generation ............................................................................................... 260
ACL Configuration Rules ........................................................................................... 261
Configuring ACLs ............................................................................................... 261
Selecting Policies: IKE/IPSec Transform-Sets.......................................................... 263
Security Policy Considerations .......................................................................... 264
Configuring Policy............................................................................................... 264
Creating Crypto Maps................................................................................................. 265
Configuring Crypto Maps .................................................................................. 265
Authentication, Authorization and Accounting Configuration ........................... 266
AAA Commands ................................................................................................. 266
Configuring AAA ................................................................................................ 267
PKI Configuration Options......................................................................................... 268
Configuring PKI................................................................................................... 269
PKI Certificate Enrollment Example ......................................................................... 269
Interface VPN Options ................................................................................................ 274
VPN Interface Sub-Commands.......................................................................... 274
Configuring a Simple VPN Site-to-Site Application...................................................... 275
Configuring the VPN Using EZ-IPSec ............................................................................. 278
Vue de la page 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 413 414

Commentaires sur ces manuels

Pas de commentaire