Planet MH-5000 User Manual page 5

Multi-homing security gateway
Hide thumbs Also See for MH-5000:
Table of Contents

Advertisement

9.4.2
Setup Service .............................................................................................................................79
9.4.3
Setup Schedule ..........................................................................................................................81
Chapter 10 Firewall.........................................................................................................................83
10.1
Demands ............................................................................................................................................83
10.2
Objectives...........................................................................................................................................83
10.3
Methods..............................................................................................................................................83
10.4
Steps ..................................................................................................................................................84
Block internal PC session (LAN à WAN)....................................................................................84
10.4.1
10.4.2
Setup Anti-DoS...........................................................................................................................86
Chapter 11 IP/MAC Binding ...........................................................................................................89
11.1
Demands ............................................................................................................................................89
11.2
Objectives...........................................................................................................................................89
11.3
Methods..............................................................................................................................................89
11.4
Steps ..................................................................................................................................................89
Chapter 12 VPN Technical Introduction .......................................................................................93
12.1
VPN benefit ........................................................................................................................................93
12.2
Related Terminology Explanation........................................................................................................93
12.2.1
VPN ...........................................................................................................................................93
12.2.2
IPSec .........................................................................................................................................93
12.2.3
Security Association ...................................................................................................................93
12.2.4
IPSec Algorithms ........................................................................................................................93
12.2.5
Key Management .......................................................................................................................94
12.2.6
Encapsulation.............................................................................................................................95
12.2.7
IPSec Protocols ..........................................................................................................................95
12.3
Make VPN packets pass through MH-5000 .........................................................................................96
Chapter 13 Virtual Private Network - IPSec .................................................................................97
13.1
Demands ............................................................................................................................................97
13.2
Objectives...........................................................................................................................................97
13.3
Methods..............................................................................................................................................97
13.4
Steps ..................................................................................................................................................98
Chapter 14 Virtual Private Network -Dynamic IPSec ................................................................ 115
14.1
Demands ..........................................................................................................................................115
14.2
Objectives.........................................................................................................................................115
14.3
Methods............................................................................................................................................115
14.4
Steps ................................................................................................................................................116
Chapter 15 Virtual Private Network - Hub and Spoke VPN.......................................................123
15.1
Demands ..........................................................................................................................................123
15.2
Objectives.........................................................................................................................................123
15.3
Methods............................................................................................................................................123
15.4
Steps ................................................................................................................................................124
Chapter 16 Remote Access VPN - PPTP....................................................................................129
16.1
Demands ..........................................................................................................................................129
16.2
Objectives.........................................................................................................................................129
16.3
Methods............................................................................................................................................130
16.4
Steps ................................................................................................................................................130
Multi-Homing Security Gateway User's Manual
III

Advertisement

Table of Contents
loading

Table of Contents