Avaya Configuring Integrated IP Security Instrukcja Użytkownika Strona 5

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 72
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 4
304111-A
Rev 00
v
Contents
Preface
Before You Begin .............................................................................................................xiii
Text Conventions .............................................................................................................xiv
Acronyms ......................................................................................................................... xv
Bay Networks Technical Publications ..............................................................................xvi
How to Get Help .............................................................................................................xvii
Chapter 1
Overview
How IPsec Works ...........................................................................................................1-1
Network Considerations .................................................................................................1-1
Supported Routers ...................................................................................................1-2
Supported WAN Protocols .......................................................................................1-2
IPsec Protection .............................................................................................................1-2
IPsec Tunnel Mode ...................................................................................................1-3
Security Protocols Overview ....................................................................................1-4
Encapsulating Security Payload ........................................................................1-4
Authentication Header .......................................................................................1-4
IPsec Services .........................................................................................................1-5
Chapter 2
Getting Started with IPsec
Security Gateway ............................................................................................................2-2
Security Policies .............................................................................................................2-3
Policy Templates ......................................................................................................2-3
IPsec Policies ...........................................................................................................2-4
Criteria Specification ..........................................................................................2-4
Action Specification ...........................................................................................2-4
Inbound Policies .......................................................................................................2-5
Outbound Policies ....................................................................................................2-5
Przeglądanie stron 4
1 2 3 4 5 6 7 8 9 10 ... 71 72

Komentarze do niniejszej Instrukcji

Brak uwag