Cisco PIX 525 Spécifications Page 20

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 466
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 19
xx
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
About This Guide
Document Organization
Document Organization
This guide includes the following chapters and appendixes:
Chapter 1, “Getting Started, describes the benefits provided by PIX Firewall and the technology
used to implement each feature.
Chapter 2, “Establishing Connectivity, describes how to establish secure connectivity between an
unprotected network, such as the public Internet, and one or more protected networks.
Chapter 3, “Controlling Network Access and Use, describes how to control connectivity between
unprotected and protected networks and how to control network use through filtering and other
PIX
Firewall features.
Chapter 4, “Using PIX Firewall in SOHO Networks, describes how to configure the PIX Firewall
as a Cisco Easy VPN Remote device and as a Point-to-Point-Protocol over Ethernet (PPPoE) client.
It also describes how to use the PIX
Firewall as a Dynamic Host Configuration Protocol (DHCP)
server, client, and relay agent.
Chapter 5, “Configuring Application Inspection (Fixup), describes how the application inspection
function enables the secure use of specific applications and services.
Chapter 6, “Configuring IPSec and Certification Authorities, describes how to configure the
PIX Firewall to support Virtual Private Networks (VPNs).
Chapter 7, “Site-to-Site VPN Configuration Examples, provides examples of using PIX Firewall to
establish site-to-site VPNs.
Chapter 8, “Managing VPN Remote Access, describes how to configure the PIX Firewall as an
Easy VPN Server and how to configure Easy VPN Remote software clients. It also describes how to
configure the PIX
Firewall to support remote PPTP clients.
Chapter 9, “Accessing and Monitoring PIX Firewall, describes how to implement, configure, and
integrate PIX Firewall system management tools.
Chapter 10, “Using PIX Firewall Failover, describes how to implement and configure the failover
feature.
Chapter 11, “Changing Feature Licenses and System Software, describes how to upgrade or
downgrade your PIX Firewall software image and feature license.
Appendix A, “Acronyms and Abbreviations, lists the acronyms and abbreviations used in this
guide.
Appendix B, “Configuration Examples for Other Remote Access Clients” describes how to use
PIX Firewall with different remote access clients, including MS Windows 2000/L2TP and Cisco
Secure VPN Client Version 1.1.
Appendix C, “MS-Exchange Firewall Configuration, describes how to configure PIX Firewall to
handle mail transfers across the PIX Firewall from Windows NT Servers on protected and
unprotected networks.
Appendix D, “TCP/IP Reference Information, lists the IP addresses associated with each subnet
mask value.
Appendix E, “Supported VPN Standards and Security Proposals,lists the standards supported for
IPSec, IKE, and certification authorities (CA).
Vue de la page 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 465 466

Commentaires sur ces manuels

Pas de commentaire