HP X Unified Security Platform Series Instrukcja Użytkownika Strona 199

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 333
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 198
About VPN
X Family LSM User’s Guide V 2.5.1 183
Authentication establishes the identity of a remote user or device to verify that they have permission
to access network resources. The X family provides two types of authentication methods:
o
User Authentication — username/password verification methods to ensure that only authorized
users may access client-to-site VPNs. Access privileges are used to control what network
services are available to each user. On the X family device, user accounts are configured from
the Authentication menu page. L2TP over IPSec and PPTP VPN protocols use user
authentication.
o
Packet Authentication — provides data integrity and origin authentication while also providing
protection against replay attacks. The X family device supports PKI (Public Key Infrastructure)
for IPSec with X.509 certificates.
Encryption is applied to the tunneled connection to scramble data, thus making data legible only to
recipients with the correct key. Using cryptographic algorithms, information is scrambled
(encrypted) by the initiator and then unscrambled (decrypted) when it reaches the recipient.
Recipients of encrypted data must have access privileges and hold specific keys in order to read the
data.
For additional information, see the following topics:
VPN Configuration Overview” on page 183
“IKE Proposal” on page 198
IPSec Configuration” on page 184
L2TP Configuration” on page 208
PPTP Configuration” on page 212
VPN Configuration Overview
Use the following overview to guide the VPN Setup process for the X family device:
STEP 1
Install the high-encryption service pack on the device.
By default all new X family devices are supplied with 56-bit DES encryption only. To enable
the strong encryption functionality (3DES, 128-AES, 192-AES, 256-AES) required to create
secure VPN connections, install the correct Strong Encryption Service Pack for your device
available from the TMC Web site.
STEP 2
Decide whether you require a site-to-site or client-to-site VPN connection.
Note This user guide describes the LSM menu pages and parameters available for
VPN configuration and management. It also provides procedures to configure tunneling
protocols and IKE proposals. For a more detailed explanation of VPN Configuration along
with deployment scenarios, see the Concepts Guide, available from the X family product
documentation section of the TMC website.
Note This user guide describes the LSM menu pages and parameters available for
VPN configuration and management. It also provides procedures to configure tunneling
protocols and IKE proposals. For a broader explanation of VPN Configuration along with
deployment scenarios, see the Concepts Guide.
Przeglądanie stron 198
1 2 ... 194 195 196 197 198 199 200 201 202 203 204 ... 332 333

Komentarze do niniejszej Instrukcji

Brak uwag