Avaya Configuring Integrated IP Security Instrukcja Użytkownika Strona 44

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 72
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 43
Configuring IP Security Services
3-8
304111-A Rev 00
The corresponding policy actions are:
•Drop
Bypass
Protect
Log (a message will be written to the router log)
The first three actions are mutually exclusive. You can specify a logging action for
any of the other three actions. Note that if an incoming packet that does not match
any configured policy arrives at an IPsec interface, it is dropped by default.
Policy Considerations
When you configure a WAN interface with IPsec, all inbound and outbound traffic
on that interface is processed by IPsec, including traffic being forwarded.
For unicast traffic containing routing or control information, consider configuring
policies that allow such traffic to bypass IPsec. For example, to allow ICMP traffic
(such as “ping” or “destination unreachable” messages) to bypass IPsec
processing, configure the first policy for the interface with the protocol criterion
set to number 1 (ICMP) and the action specification set to bypass.
If a data packet matches the criteria for more than one policy, the first matching
policy is used.
Przeglądanie stron 43
1 2 ... 39 40 41 42 43 44 45 46 47 48 49 ... 71 72

Komentarze do niniejszej Instrukcji

Brak uwag