Eltex ESR-12V [10/548] Маршрутизаторы esr 10 esr 12v справочник команд cli

Eltex ESR-10 [10/548] Маршрутизаторы esr 10 esr 12v справочник команд cli
10 Маршрутизаторы ESR-10, ESR-12V, Справочник команд CLI
20.18 action destination-nat .................................................................................................................. 235
20.19 ip address ..................................................................................................................................... 236
20.20 ip port ........................................................................................................................................... 236
20.21 ip address-range ........................................................................................................................... 236
20.22 ip port-range ................................................................................................................................ 237
20.23 persistent ..................................................................................................................................... 237
20.24 show ip nat ruleset ....................................................................................................................... 238
20.25 show ip nat pool ........................................................................................................................... 239
20.26 show nat proxy-arp ...................................................................................................................... 240
20.27 show ip nat translations ............................................................................................................... 240
21 НАСТРОЙКИ IPSEC VPN ......................................................................................................................... 242
21.1 Управление VPN. Настройки IKE ................................................................................................ 242
21.1.1 security ike proposal .................................................................................................................... 242
21.1.2 security ike policy ......................................................................................................................... 242
21.1.3 security ike gateway ..................................................................................................................... 243
21.1.4 description ................................................................................................................................... 243
21.1.5 authentication method ................................................................................................................ 244
21.1.6 encryption algorithm ................................................................................................................... 244
21.1.7 dh-group ....................................................................................................................................... 245
21.1.8 authentication algorithm ............................................................................................................. 245
21.1.9 lifetime ......................................................................................................................................... 246
21.1.10 mode ...................................................................................................................................... 246
21.1.11 pre-shared-key ....................................................................................................................... 247
21.1.12 proposal ................................................................................................................................. 248
21.1.13 version ................................................................................................................................... 248
21.1.14 ike-policy ................................................................................................................................ 249
21.1.15 dead-peer-detection action ................................................................................................... 249
21.1.16 dead-peer-detection interval ................................................................................................ 250
21.1.17 dead-peer-detection timeout ................................................................................................ 250
21.1.18 mode ...................................................................................................................................... 251
21.1.19 bind-interface vti ................................................................................................................... 251
21.1.20 show security ike ................................................................................................................... 252
21.2 Управление VPN. Настройки IPsec ............................................................................................ 253
21.2.1 security ipsec proposal ................................................................................................................. 253
21.2.2 security ipsec policy ..................................................................................................................... 253
21.2.3 security ipsec vpn ......................................................................................................................... 254
21.2.4 description ................................................................................................................................... 254
21.2.5 ike ipsec-policy ............................................................................................................................. 255
21.2.6 ike gateway .................................................................................................................................. 255
21.2.7 ike establish-tunnel ...................................................................................................................... 256
21.2.8 ike dscp ........................................................................................................................................ 256
21.2.9 mode ............................................................................................................................................ 257
21.2.10 manual mode ......................................................................................................................... 257
21.2.11 enable .................................................................................................................................... 258
21.2.12 manual bind-interface vti ...................................................................................................... 258
21.2.13 manual protocol .................................................................................................................... 259
21.2.14 manual spi .............................................................................................................................. 260
21.2.15 manual authentication algorithm .......................................................................................... 260
21.2.16 manual authentication key .................................................................................................... 261
21.2.17 manual encryption algorithm ................................................................................................ 261
21.2.18 manual encryption key .......................................................................................................... 262
21.2.19 protocol ................................................................................................................................. 262
21.2.20 authentication algorithm ....................................................................................................... 263
21.2.21 encryption algorithm ............................................................................................................. 264

Содержание

Похожие устройства

Скачать