D-Link DFL-1500 Инструкция по эксплуатации онлайн [5/271] 17569

D-Link DFL-1500 Инструкция по эксплуатации онлайн [5/271] 17569
III
8.4.2 Add a policy routing entry..............................................................................................................................76
8.5 The priority of the routing........................................................................................................................................79
Part IV Firewall & IP/MAC Binding..............................................................................................................82
Chapter 9 IP/Services grouping..........................................................................................................................83
9.1 Demands..................................................................................................................................................................83
9.2 Objectives................................................................................................................................................................83
9.3 Methods ...................................................................................................................................................................83
9.4 Steps.........................................................................................................................................................................83
9.4.1 Setup Address.................................................................................................................................................83
9.4.2 Setup Service..................................................................................................................................................86
9.4.3 Setup Schedule...............................................................................................................................................88
Chapter 10 Firewall ............................................................................................................................................91
10.1 Demands..................................................................................................................................................................91
10.2 Objectives................................................................................................................................................................91
10.3 Methods ...................................................................................................................................................................91
10.4 Steps.........................................................................................................................................................................92
10.4.1 Block internal PC session (LAN Æ WAN)....................................................................................................92
10.4.2 Setup Anti-DoS..............................................................................................................................................95
Chapter 11 IP/MAC Binding..............................................................................................................................97
11.1 Demands..................................................................................................................................................................97
11.2 Objectives................................................................................................................................................................97
11.3 Methods ...................................................................................................................................................................97
11.4 Steps.........................................................................................................................................................................97
Part V Virtual Private Network....................................................................................................................101
Chapter 12 VPN Technical Introduction ..........................................................................................................102
12.1 VPN benefit...........................................................................................................................................................102
12.2 Related Terminology Explanation.........................................................................................................................102
12.2.1 VPN..............................................................................................................................................................102
12.2.2 IPSec ............................................................................................................................................................102
12.2.3 Security Association.....................................................................................................................................102
12.2.4 IPSec Algorithms .........................................................................................................................................102
12.2.5 Key Management .........................................................................................................................................103
12.2.6 Encapsulation...............................................................................................................................................104
12.2.7 IPSec Protocols ............................................................................................................................................104
12.3 Make VPN packets pass through DFL-1500 .........................................................................................................105
Chapter 13 Virtual Private Network – IPSec....................................................................................................107
13.1 Demands................................................................................................................................................................107
13.2 Objectives..............................................................................................................................................................107
13.3 Methods .................................................................................................................................................................107
13.4 Steps.......................................................................................................................................................................108
13.4.1 DES/MD5 IPSec tunnel: the IKE way .........................................................................................................108
13.4.2 DES/MD5 IPSec tunnel: the Manual-Key way............................................................................................117
Chapter 14 Virtual Private Network –Dynamic IPSec .....................................................................................125
14.1 Demands................................................................................................................................................................125
14.2 Objectives..............................................................................................................................................................125

Содержание

Скачать