5.9.2
5.9.3
5.10
5.10.1
5.10.2
IPSec tunnels ..................................................................................... 65
5.10.2.1
5.10.2.2
5.10.3
Logs....................................................................................................... 70
5.10.4
Diagnostics ......................................................................................... 70
5.11
‡Configuring SSH ..................................................................................... 70
5.11.1
Access table entry ............................................................................ 71
5.11.2
Operation ............................................................................................ 71
5.11.3
Diagnostics ......................................................................................... 72
5.12
TCP optimisation ..................................................................................... 72
5.12.1
How does PEP work? ...................................................................... 72
5.12.2
How to deploy PEP .......................................................................... 74
5.13
5.13.1
5.13.2
5.13.3
Routing ................................................................................................ 76
5.13.4
5.13.5
5.14
5.14.1
Clock Hierarchy ................................................................................. 78
5.14.2
5.14.3
Global Clocks ..................................................................................... 78
5.14.4
Example ............................................................................................... 79
5.14.5
Terminal Timing ................................................................................ 81
5.14.6
5.14.7
Receive Clocks ................................................................................... 82
5.14.8
Transmit Clocks ................................................................................ 83
5.15
viii
............................................................. 74
66
68