Chapter 10 Firewall; Chapter 12 Vpn Technical Introduction - Planet Networking & Communication MH-5001 User Manual

Multi-homing utm security gateway
Table of Contents

Advertisement

9.4.1
Setup Address................................................................................................................................................. 77
9.4.2
Setup Service.................................................................................................................................................. 81
9.4.3
Setup Schedule ............................................................................................................................................... 83

Chapter 10 Firewall ................................................................................................................. 85

10.1
Demands .................................................................................................................................................................. 85
10.2
Objectives ................................................................................................................................................................ 85
10.3
Methods ................................................................................................................................................................... 85
10.4
Steps......................................................................................................................................................................... 86
10.4.1
Block internal PC session (LAN
10.4.2
Setup Anti-DoS .............................................................................................................................................. 88
Chapter 11 IP/MAC Binding ................................................................................................. 91
11.1
Demands .................................................................................................................................................................. 91
11.2
Objectives ................................................................................................................................................................ 91
11.3
Methods ................................................................................................................................................................... 91
11.4
Steps......................................................................................................................................................................... 91

Chapter 12 VPN Technical Introduction .......................................................................... 95

12.1
VPN benefit ............................................................................................................................................................. 95
12.2
Related Terminology Explanation ........................................................................................................................... 95
12.2.1
VPN................................................................................................................................................................ 95
12.2.2
IPSec .............................................................................................................................................................. 95
12.2.3
Security Association....................................................................................................................................... 95
12.2.4
IPSec Algorithms ........................................................................................................................................... 95
12.2.5
Key Management ........................................................................................................................................... 96
12.2.6
Encapsulation ................................................................................................................................................. 97
12.2.7
IPSec Protocols .............................................................................................................................................. 97
12.3
Make VPN packets pass through MH-5001............................................................................................................. 98
Chapter 13 Virtual Private Network – IPSec ................................................................. 99
13.1
Demands .................................................................................................................................................................. 99
13.2
Objectives ................................................................................................................................................................ 99
13.3
Methods ................................................................................................................................................................... 99
13.4
Steps....................................................................................................................................................................... 100
 
DES/MD5 IPSec tunnel: the IKE way ......................................................................................................... 100
 
DES/MD5 IPSec tunnel: the Manual-Key way ............................................................................................ 109
Chapter 14 Virtual Private Network –Dynamic IPSec ...............................................116
14.1
Demands ................................................................................................................................................................ 116
14.2
Objectives .............................................................................................................................................................. 116
14.3
Methods ................................................................................................................................................................. 116
14.4
Steps....................................................................................................................................................................... 117
Chapter 15 Virtual Private Network – Hub and Spoke VPN .................................................. 123
15.1
Demands ................................................................................................................................................................ 123
15.2
Objectives .............................................................................................................................................................. 123
15.3
Methods ................................................................................................................................................................. 124
15.4
Steps....................................................................................................................................................................... 124
Chapter 16 Remote Access VPN – PPTP ........................................................................ 131
Multi-Homing Security Gateway User's Manual
WAN).................................................................................................... 86
III

Advertisement

Table of Contents
loading

Table of Contents