8.4.2
Add a policy routing entry..............................................................................................................................78
8.5
The priority of the routing........................................................................................................................................81
Firewall & IP/MAC Binding ..............................................................................................................84
Chapter 9 IP/Services grouping ..........................................................................................................................85
9.1
Demands ..................................................................................................................................................................85
9.2
Objectives ................................................................................................................................................................85
9.3
Methods ...................................................................................................................................................................85
9.4
Steps.........................................................................................................................................................................85
9.4.1
Setup Address.................................................................................................................................................85
9.4.2
Setup Service..................................................................................................................................................89
9.4.3
Setup Schedule ...............................................................................................................................................91
Chapter 10 Firewall ............................................................................................................................................93
10.1
Demands ..................................................................................................................................................................93
10.2
Objectives ................................................................................................................................................................93
10.3
Methods ...................................................................................................................................................................93
10.4
Steps.........................................................................................................................................................................94
10.4.1
10.4.2
Setup Anti-DoS ..............................................................................................................................................97
Chapter 11 IP/MAC Binding ..............................................................................................................................99
11.1
Demands ..................................................................................................................................................................99
11.2
Objectives ................................................................................................................................................................99
11.3
Methods ...................................................................................................................................................................99
11.4
Steps.........................................................................................................................................................................99
Virtual Private Network ....................................................................................................................103
12.1
VPN benefit ...........................................................................................................................................................104
12.2
Related Terminology Explanation .........................................................................................................................104
12.2.1
VPN..............................................................................................................................................................104
12.2.2
IPSec ............................................................................................................................................................104
12.2.3
Security Association.....................................................................................................................................104
12.2.4
IPSec Algorithms .........................................................................................................................................104
12.2.5
Key Management .........................................................................................................................................105
12.2.6
Encapsulation ...............................................................................................................................................106
12.2.7
IPSec Protocols ............................................................................................................................................106
12.3
13.1
Demands ................................................................................................................................................................109
13.2
Objectives ..............................................................................................................................................................109
13.3
Methods .................................................................................................................................................................109
13.4
Steps.......................................................................................................................................................................110
13.4.1
13.4.2
14.1
Demands ................................................................................................................................................................127
14.2
Objectives ..............................................................................................................................................................127
III