Planet mh-5000 User Manual page 5

Hide thumbs Also See for mh-5000:
Table of Contents

Advertisement

5.2
Methods ......................................................................................................................38
5.3
Steps...........................................................................................................................39
5.3.1
Telnet .........................................................................................................................................39
5.3.2
WWW.........................................................................................................................................39
5.3.3
SNMP.........................................................................................................................................39
5.3.4
ICMP ..........................................................................................................................................39
Chapter 6 NAT .........................................................................................................40
6.1
Demands.....................................................................................................................40
6.2
Objectives ...................................................................................................................41
6.3
Methods ......................................................................................................................41
6.4
Steps...........................................................................................................................42
6.4.1
Setup Many-to-one NAT rules.....................................................................................................42
6.4.2
Setup Virtual Server for the FtpServer1.......................................................................................46
6.5
NAT modes introduction..............................................................................................50
6.5.1
Many-to-One type.......................................................................................................................50
6.5.2
Many-to-Many type.....................................................................................................................51
6.5.3
One-to-One type.........................................................................................................................51
6.5.4
NAT modes & types....................................................................................................................52
Chapter 7 Routing...................................................................................................53
7.1
Demands.....................................................................................................................53
7.2
Objectives ...................................................................................................................54
7.3
Methods ......................................................................................................................54
7.4
Steps...........................................................................................................................54
7.4.1
Add a static routing entry ............................................................................................................54
7.4.2
Add a policy routing entry ...........................................................................................................56
Chapter 8 Firewall ...................................................................................................59
8.1
Demands.....................................................................................................................59
8.2
Objectives ...................................................................................................................59
8.3
Methods ......................................................................................................................59
8.4
Steps...........................................................................................................................60
8.4.1
Block internal PC session (LAN à WAN)....................................................................................60
8.4.2
Setup Alert detected attack.........................................................................................................63
Chapter 9 VPN Technical Introduction ..................................................................65
9.1
VPN benefit.................................................................................................................65
9.2
Related Terminology Explanation ...............................................................................65
9.2.1
VPN ...........................................................................................................................................65
9.2.2
IPSec .........................................................................................................................................65
9.2.3
Security Association ...................................................................................................................65
9.2.4
IPSec Algorithms ........................................................................................................................65
9.2.5
Key Management .......................................................................................................................66
9.2.6
Encapsulation.............................................................................................................................67
II

Advertisement

Table of Contents
loading

Table of Contents