Cisco PIX 525 Especificaciones Pagina 389

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 388
CHAPTER
23-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
23
Configuring IPSec and ISAKMP
This chapter describes how to configure the IPSec and ISAKMP standards to build virtual private
networks. It includes the following sections:
Tunneling Overview, page 23-1
IPSec Overview, page 23-2
Configuring ISAKMP, page 23-2
Configuring Certificate Group Matching, page 23-9
Configuring IPSec, page 23-11
Clearing Security Associations, page 23-20
Clearing Crypto Map Configurations, page 23-21
Tunneling Overview
Tunneling is the heart of virtual private networks. Tunnels make it possible to use a public TCP/IP
network, such as the Internet, to create secure connections between remote users and a private corporate
network.
The secure connection is called a tunnel. The security appliance uses the ISAKMP and IPSec tunneling
standards to build and manage tunnels. ISAKMP and IPSec accomplish the following:
Negotiate tunnel parameters
Establish tunnels
Authenticate users and data
Manage security keys
Encrypt and decrypt data
Manage data transfer across the tunnel
Manage data transfer inbound and outbound as a tunnel endpoint or router
The security appliance functions as a bidirectional tunnel endpoint. It can receive plain packets from the
private network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where
they are unencapsulated and sent to their final destination. It can also receive encapsulated packets from
the public network, unencapsulate them, and send them to their final destination on the private network.
Vista de pagina 388
1 2 ... 384 385 386 387 388 389 390 391 392 393 394 ... 603 604

Comentarios a estos manuales

Sin comentarios