9.4.2
Setup Service .............................................................................................................................79
9.4.3
Setup Schedule ..........................................................................................................................81
Chapter 10 Firewall.........................................................................................................................83
10.1
Demands ............................................................................................................................................83
10.2
Objectives...........................................................................................................................................83
10.3
Methods..............................................................................................................................................83
10.4
Steps ..................................................................................................................................................84
10.4.1
10.4.2
Setup Anti-DoS...........................................................................................................................86
Chapter 11 IP/MAC Binding ...........................................................................................................89
11.1
Demands ............................................................................................................................................89
11.2
Objectives...........................................................................................................................................89
11.3
Methods..............................................................................................................................................89
11.4
Steps ..................................................................................................................................................89
12.1
VPN benefit ........................................................................................................................................93
12.2
12.2.1
VPN ...........................................................................................................................................93
12.2.2
IPSec .........................................................................................................................................93
12.2.3
Security Association ...................................................................................................................93
12.2.4
IPSec Algorithms ........................................................................................................................93
12.2.5
Key Management .......................................................................................................................94
12.2.6
Encapsulation.............................................................................................................................95
12.2.7
IPSec Protocols ..........................................................................................................................95
12.3
13.1
Demands ............................................................................................................................................97
13.2
Objectives...........................................................................................................................................97
13.3
Methods..............................................................................................................................................97
13.4
Steps ..................................................................................................................................................98
14.1
Demands ..........................................................................................................................................115
14.2
Objectives.........................................................................................................................................115
14.3
Methods............................................................................................................................................115
14.4
Steps ................................................................................................................................................116
15.1
Demands ..........................................................................................................................................123
15.2
Objectives.........................................................................................................................................123
15.3
Methods............................................................................................................................................123
15.4
Steps ................................................................................................................................................124
16.1
Demands ..........................................................................................................................................129
16.2
Objectives.........................................................................................................................................129
16.3
Methods............................................................................................................................................130
16.4
Steps ................................................................................................................................................130
Multi-Homing Security Gateway User's Manual
III