5.3.4
ICMP .............................................................................................................................................................. 32
NAT¡ B Routing & Firewall .................................................................................................................34
Chapter 6 NAT ....................................................................................................................................................35
6.1
Demands................................................................................................................................................................... 35
6.2
Objectives................................................................................................................................................................. 35
6.3
Methods.................................................................................................................................................................... 36
6.4
Steps ......................................................................................................................................................................... 36
6.4.1
Setup Many-to-one NAT rules........................................................................................................................ 36
6.4.2
Chapter 7 Routing...............................................................................................................................................45
7.1
Demands................................................................................................................................................................... 45
7.2
Objectives................................................................................................................................................................. 45
7.3
Methods.................................................................................................................................................................... 46
7.4
Steps ......................................................................................................................................................................... 46
7.4.1
Add a static routing entry................................................................................................................................ 46
7.4.2
Add a policy routing entry .............................................................................................................................. 47
Chapter 8 Firewall...............................................................................................................................................49
8.1
Demands................................................................................................................................................................... 49
8.2
Objectives................................................................................................................................................................. 49
8.3
Methods.................................................................................................................................................................... 49
8.4
Steps ......................................................................................................................................................................... 50
8.4.1
8.4.2
Setup Alert detected attack ............................................................................................................................. 51
Virtual Private Network ......................................................................................................................54
9.1
Terminology Explanation......................................................................................................................................... 55
9.1.1
VPN ................................................................................................................................................................ 55
9.1.2
IPSec............................................................................................................................................................... 55
9.1.3
Security Association ....................................................................................................................................... 55
9.1.4
IPSec Algorithms............................................................................................................................................ 55
9.1.5
Key Management............................................................................................................................................ 55
9.1.6
Encapsulation.................................................................................................................................................. 56
9.1.7
IPSec Protocols............................................................................................................................................... 57
9.2
10.1
Demands................................................................................................................................................................... 59
10.2
Objectives................................................................................................................................................................. 59
10.3
Methods.................................................................................................................................................................... 59
10.4
Steps ......................................................................................................................................................................... 60
¡ @
¡ @
11.1
Demands................................................................................................................................................................... 75
11.2
Objectives................................................................................................................................................................. 75
11.3
Methods.................................................................................................................................................................... 75
WAN) .................................................................................................... 50
II