D-Link DFL-860 Инструкция по эксплуатации онлайн [7/552] 17555

D-Link DFL-860 Инструкция по эксплуатации онлайн [7/552] 17555
7. Address Translation ........................................................................................340
7.1. Overview ............................................................................................340
7.2. NAT ..................................................................................................341
7.3. NAT Pools .......................................................................................... 346
7.4. SAT ................................................................................................... 349
7.4.1. Translation of a Single IP Address (1:1) .........................................349
7.4.2. Translation of Multiple IP Addresses (M:N) .................................... 354
7.4.3. All-to-One Mappings (N:1) .........................................................356
7.4.4. Port Translation ......................................................................... 356
7.4.5. Protocols Handled by SAT ..........................................................357
7.4.6. Multiple SAT Rule Matches .........................................................357
7.4.7. SAT and FwdFast Rules ..............................................................358
8. User Authentication ........................................................................................361
8.1. Overview ............................................................................................361
8.2. Authentication Setup .............................................................................363
8.2.1. Setup Summary .........................................................................363
8.2.2. The Local Database ....................................................................363
8.2.3. External RADIUS Servers ...........................................................365
8.2.4. External LDAP Servers ............................................................... 365
8.2.5. Authentication Rules ..................................................................372
8.2.6. Authentication Processing ........................................................... 374
8.2.7. A Group Usage Example ............................................................. 375
8.2.8. HTTP Authentication .................................................................375
8.3. Customizing HTML Pages .....................................................................379
9. VPN ............................................................................................................. 383
9.1. Overview ............................................................................................383
9.1.1. VPN Usage ...............................................................................383
9.1.2. VPN Encryption ........................................................................ 384
9.1.3. VPN Planning ...........................................................................384
9.1.4. Key Distribution ........................................................................385
9.1.5. The TLS Alternative for VPN ......................................................385
9.2. VPN Quick Start .................................................................................. 387
9.2.1. IPsec LAN to LAN with Pre-shared Keys .......................................388
9.2.2. IPsec LAN to LAN with Certificates .............................................389
9.2.3. IPsec Roaming Clients with Pre-shared Keys .................................. 390
9.2.4. IPsec Roaming Clients with Certificates .........................................392
9.2.5. L2TP Roaming Clients with Pre-Shared Keys .................................393
9.2.6. L2TP Roaming Clients with Certificates ........................................ 394
9.2.7. PPTP Roaming Clients ...............................................................395
9.3. IPsec Components ................................................................................397
9.3.1. Overview .................................................................................397
9.3.2. Internet Key Exchange (IKE) .......................................................397
9.3.3. IKE Authentication .................................................................... 403
9.3.4. IPsec Protocols (ESP/AH) ........................................................... 404
9.3.5. NAT Traversal .......................................................................... 405
9.3.6. Algorithm Proposal Lists .............................................................407
9.3.7. Pre-shared Keys ........................................................................408
9.3.8. Identification Lists ..................................................................... 409
9.4. IPsec Tunnels ...................................................................................... 412
9.4.1. Overview .................................................................................412
9.4.2. LAN to LAN Tunnels with Pre-shared Keys ................................... 414
9.4.3. Roaming Clients ........................................................................414
9.4.4. Fetching CRLs from an alternate LDAP server ................................419
9.4.5. Troubleshooting with ikesnoop .....................................................420
9.4.6. IPsec Advanced Settings .............................................................427
9.5. PPTP/L2TP .........................................................................................431
9.5.1. PPTP Servers ............................................................................ 431
9.5.2. L2TP Servers ............................................................................ 432
9.5.3. L2TP/PPTP Server advanced settings ............................................ 436
9.5.4. PPTP/L2TP Clients ....................................................................437
9.6. CA Server Access ................................................................................440
9.7. VPN Troubleshooting ...........................................................................443
9.7.1. General Troubleshooting ............................................................. 443
User Manual
7

Содержание

Скачать