Enterasys ANG-3000 User's Guide Page 26

  • Download
  • Add to my manuals
  • Print
  • Page
    / 414
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 25
Table of Contents
xxvi XSR-1805 Users Guide
Client...................................................................................................................... 255
Configuring OSPF with Fail Over ..................................................................... 256
Server 1.................................................................................................................. 256
Server 2.................................................................................................................. 256
Client...................................................................................................................... 256
Limitations............................................................................................................ 257
XSR VPN Features............................................................................................................... 258
VPN Configuration Overview .......................................................................................... 259
Master Key Generation ............................................................................................... 260
ACL Configuration Rules ........................................................................................... 261
Configuring ACLs ............................................................................................... 261
Selecting Policies: IKE/IPSec Transform-Sets.......................................................... 263
Security Policy Considerations .......................................................................... 264
Configuring Policy............................................................................................... 264
Creating Crypto Maps................................................................................................. 265
Configuring Crypto Maps .................................................................................. 265
Authentication, Authorization and Accounting Configuration ........................... 266
AAA Commands ................................................................................................. 266
Configuring AAA ................................................................................................ 267
PKI Configuration Options......................................................................................... 268
Configuring PKI................................................................................................... 269
PKI Certificate Enrollment Example ......................................................................... 269
Interface VPN Options ................................................................................................ 274
VPN Interface Sub-Commands.......................................................................... 274
Configuring a Simple VPN Site-to-Site Application...................................................... 275
Configuring the VPN Using EZ-IPSec ............................................................................. 278
Page view 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 413 414

Comments to this Manuals

No comments