Enterasys ANG-3000 Guía de usuario Pagina 26

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 414
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 25
Table of Contents
xxvi XSR-1805 Users Guide
Client...................................................................................................................... 255
Configuring OSPF with Fail Over ..................................................................... 256
Server 1.................................................................................................................. 256
Server 2.................................................................................................................. 256
Client...................................................................................................................... 256
Limitations............................................................................................................ 257
XSR VPN Features............................................................................................................... 258
VPN Configuration Overview .......................................................................................... 259
Master Key Generation ............................................................................................... 260
ACL Configuration Rules ........................................................................................... 261
Configuring ACLs ............................................................................................... 261
Selecting Policies: IKE/IPSec Transform-Sets.......................................................... 263
Security Policy Considerations .......................................................................... 264
Configuring Policy............................................................................................... 264
Creating Crypto Maps................................................................................................. 265
Configuring Crypto Maps .................................................................................. 265
Authentication, Authorization and Accounting Configuration ........................... 266
AAA Commands ................................................................................................. 266
Configuring AAA ................................................................................................ 267
PKI Configuration Options......................................................................................... 268
Configuring PKI................................................................................................... 269
PKI Certificate Enrollment Example ......................................................................... 269
Interface VPN Options ................................................................................................ 274
VPN Interface Sub-Commands.......................................................................... 274
Configuring a Simple VPN Site-to-Site Application...................................................... 275
Configuring the VPN Using EZ-IPSec ............................................................................. 278
Vista de pagina 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 413 414

Comentarios a estos manuales

Sin comentarios