15 s – Foundry Networks AR3202-CL User Manual

Page 9

Advertising
background image

Contents

June 2004

© 2004 Foundry Networks, Inc.

ix

G

ENERIC

R

OUTING

E

NCAPSULATION

(GRE) ..............................................................................................14-7

C

HAPTER

15

S

ECURITY

F

EATURES

................................................................................ 15-1

I

NTRODUCTION

TO

S

ECURITY

....................................................................................................................15-1

E

NABLING

S

ECURITY

F

EATURES

.........................................................................................................15-1

S

ECURING

R

EMOTE

A

CCESS

U

SING

IPS

EC

VPN .......................................................................................15-2

A

CCESS

M

ETHODS

.............................................................................................................................15-2

E

XAMPLE

1: S

ECURELY

M

ANAGING

THE

F

OUNDRY

AR1204 O

VER

AN

IPS

EC

T

UNNEL

..........................15-3

E

XAMPLE

2: J

OINING

T

WO

P

RIVATE

N

ETWORKS

WITH

AN

IP S

ECURITY

T

UNNEL

.................................15-10

E

XAMPLE

3: J

OINING

T

WO

N

ETWORKS

WITH

AN

IPS

EC

T

UNNEL

USING

M

ULTIPLE

IPS

EC

P

ROPOSALS

.15-19

E

XAMPLE

4: S

UPPORTING

R

EMOTE

U

SER

A

CCESS

............................................................................15-28

E

XAMPLE

5: C

ONFIGURING

IPS

EC

R

EMOTE

A

CCESS

TO

C

ORPORATE

LAN

WITH

M

ODE

-C

ONFIGURATION

M

ETHOD

....................................................................................................................................15-37

C

ONFIGURING

GRE ................................................................................................................................15-45

F

IREWALLS

.............................................................................................................................................15-50

F

IREWALL

C

ONFIGURATION

E

XAMPLES

..............................................................................................15-50

S

TOPPING

D

O

S A

TTACKS

.................................................................................................................15-56

P

ACKET

R

EASSEMBLY

......................................................................................................................15-57

NAT C

ONFIGURATIONS

....................................................................................................................15-57

NAT C

ONFIGURATION

E

XAMPLES

.....................................................................................................15-58

S

ECURITY

P

ROTOCOL

D

EFAULTS

............................................................................................................15-61

IPS

EC

S

UPPORTED

P

ROTOCOLS

AND

A

LGORITHMS

...........................................................................15-61

F

OUNDRY

IKE

AND

IPS

EC

D

EFAULTS

...............................................................................................15-62

F

IREWALL

D

EFAULT

V

ALUES

...................................................................................................................15-63

T

UNNELING

D

EFAULT

V

ALUES

.................................................................................................................15-65

Advertising
This manual is related to the following products: