Zyxel OMNI ADSL LAN H Инструкция по эксплуатации онлайн [11/533] 211427

Zyxel OMNI ADSL LAN H Инструкция по эксплуатации онлайн [11/533] 211427
Ɋɭɤɨɜɨɞɫɬɜɨ ɩɨɥɶɡɨɜɚɬɟɥɹ ɞɥɹ ɦɚɪɲɪɭɬɢɡɚɬɨɪɨɜ ɫɟɪɢɢ OMNI ADSL LAN
xii ɉɟɪɟɱɟɧɶ ɫɯɟɦ
15.2 Ⱥɪɯɢɬɟɤɬɭɪɚ IPSec .......................................................................................................................15-3
15.2.1 Ⱥɥɝɨɪɢɬɦɵ IPSec....................................................................................................................15-4
15.2.2 ɍɩɪɚɜɥɟɧɢɟ ɤɥɸɱɚɦɢ.............................................................................................................15-4
15.3 ɂɧɤɚɩɫɭɥɹɰɢɹ...............................................................................................................................15-5
15.3.1 Ɍɪɚɧɫɩɨɪɬɧɵɣ ɪɟɠɢɦ ............................................................................................................15-5
15.3.2 Ɍɭɧɧɟɥɶɧɵɣ ɪɟɠɢɦ ................................................................................................................15-5
15.4 IPSec ɢ NAT ...................................................................................................................................15-6
Chapter 16 ɗɤɪɚɧɵ VPN .........................................................................................................................16-1
16.1 Ɉɩɢɫɚɧɢɟ VPN/IPSec....................................................................................................................16-1
16.2 Ⱥɥɝɨɪɢɬɦɵ IPSec .........................................................................................................................16-1
16.2.1 ɉɪɨɬɨɤɨɥ AH (Authentication Header - Ⱥɭɬɟɧɬɢɮɢɰɢɪɭɸɳɢɣ ɡɚɝɨɥɨɜɨɤ)........................16-1
16.2.2 ɉɪɨɬɨɤɨɥ ESP (Encapsulating Security Payload - ɂɧɤɚɩɫɭɥɹɰɢɹ ɡɚɲɢɮɪɨɜɚɧɧɵɯ ɞɚɧɧɵɯ)16-
1
16.3 ɋɨɛɫɬɜɟɧɧɵɣ IP-ɚɞɪɟɫ.................................................................................................................16-2
16.4 Ⱥɞɪɟɫ ɛɟɡɨɩɚɫɧɨɝɨ ɲɥɸɡɚ ...........................................................................................................16-2
16.4.1 Ⱦɢɧɚɦɢɱɟɫɤɢɣ ɚɞɪɟɫ ɲɥɸɡɚ ɛɟɡɨɩɚɫɧɨɫɬɢ ..........................................................................16-3
16.5 ɗɤɪɚɧ VPN Summary...................................................................................................................16-3
16.6 Ɏɭɧɤɰɢɹ Keep Alive (ɉɨɞɞɟɪɠɚɧɢɟ ɚɤɬɢɜɧɨɫɬɢ) ...................................................................16-5
16.7 Ɍɢɩ ɚɞɪɟɫɚ ɢ ɟɝɨ ɡɧɚɱɟɧɢɟ...........................................................................................................16-6
16.7.1 ɉɪɢɦɟɪɵ ɬɢɩɨɜ ɚɞɪɟɫɨɜ ɢ ɢɯ ɡɧɚɱɟɧɢɣ................................................................................16-7
16.8 Pre-Shared Key (ɉɪɟɞɜɚɪɢɬɟɥɶɧɨ ɫɨɝɥɚɫɨɜɚɧɧɵɣ ɤɥɸɱ)......................................................16-8
16.9 Ɋɟɞɚɤɬɢɪɨɜɚɧɢɟ ɫɬɪɚɬɟɝɢɣ VPN................................................................................................16-8
16.10 Ɏɚɡɵ IKE.................................................................................................................................16-15
16.10.1 Ɋɟɠɢɦ ɫɨɝɥɚɫɨɜɚɧɢɹ ....................................................................................................16-17
16.10.2 Ƚɪɭɩɩɵ ɤɥɸɱɟɣ Ⱦɢɮɮɢ-ɏɟɥɥɦɚɧɚ (Diffie-Hellman, DH) ......................................... 16-17
16.10.3 ɂɞɟɚɥɶɧɚɹ ɩɪɹɦɚɹ ɛɟɡɨɩɚɫɧɨɫɬɶ (PFS).......................................................................16-17
16.11 ɍɫɬɚɧɨɜɤɚ ɞɨɩɨɥɧɢɬɟɥɶɧɵɯ ɧɚɫɬɪɨɟɤ IKE........................................................................16-18
16.12 Ɋɭɱɧɚɹ ɧɚɫɬɪɨɣɤɚ ɤɥɸɱɟɣ....................................................................................................16-22
16.12.1 ɂɧɞɟɤɫ ɩɚɪɚɦɟɬɪɚ ɛɟɡɨɩɚɫɧɨɫɬɢ (Security Parameter Index, SPI) .............................16-22
16.13 Ɋɭɱɧɚɹ ɧɚɫɬɪɨɣɤɚ ɤɥɸɱɟɣ....................................................................................................16-23
16.14 Ɉɬɨɛɪɚɠɟɧɢɟ ɦɨɧɢɬɨɪɚ SA...................................................................................................16-29
16.15 Ʉɨɧɮɢɝɭɪɢɪɨɜɚɧɢɟ ɨɛɳɢɯ ɧɚɫɬɪɨɟɤ...................................................................................16-31
16.16 ɇɚɫɬɪɨɣɤɚ ɠɭɪɧɚɥɨɜ IPSec ..................................................................................................16-32
16.17 ɉɪɢɦɟɪɵ ɭɞɚɥɟɧɧɵɯ ɤɨɦɩɶɸɬɟɪɨɜ VPN/IPSec ................................................................16-36
16.17.1 ɉɪɢɦɟɪ: ɭɞɚɥɟɧɧɵɟ ɤɨɦɩɶɸɬɟɪɵ, ɩɨɥɶɡɭɸɳɢɟɫɹ ɨɞɧɢɦ ɩɪɚɜɢɥɨɦ VPN ..............16-37
16.17.2 ɍɞɚɥɟɧɧɵɟ ɤɨɦɩɶɸɬɟɪɵ, ɩɨɥɶɡɭɸɳɢɟɫɹ ɭɧɢɤɚɥɶɧɵɦɢ ɩɪɚɜɢɥɚɦɢ VPN...............16-38
16.18 ȼɢɪɬɭɚɥɶɧɚɹ ɱɚɫɬɧɚɹ ɫɟɬɶ ɢ ɞɢɫɬɚɧɰɢɨɧɧɨɟ ɭɩɪɚɜɥɟɧɢɟ ..............................................16-39
Chapter 17 ɇɚɫɬɪɨɣɤɚ ɞɢɫɬɚɧɰɢɨɧɧɨɝɨ ɭɩɪɚɜɥɟɧɢɹ .........................................................................17-1
17.1 Ɉɩɢɫɚɧɢɟ ɮɭɧɤɰɢɢ ɞɢɫɬɚɧɰɢɨɧɧɨɝɨ ɭɩɪɚɜɥɟɧɢɹ ..................................................................17-1
17.1.1 Ɉɝɪɚɧɢɱɟɧɢɹ ɞɢɫɬɚɧɰɢɨɧɧɨɝɨ ɭɩɪɚɜɥɟɧɢɹ..........................................................................17-1
17.1.2 Ⱦɢɫɬɚɧɰɢɨɧɧɨɟ ɭɩɪɚɜɥɟɧɢɟ ɢ ɬɪɚɧɫɥɹɰɢɹ ɫɟɬɟɜɵɯ ɚɞɪɟɫɨɜ ..............................................17-2

Содержание

Скачать