Enterasys-networks Network Card Manual de usuario Pagina 235

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 276
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 234
RiverMaster Administrators Guide
223
Appendix B Configuring Tunnel Protocols
ANG-3000/7000 Preconfiguration Stored on a Floppy Disk
2 Click on the Authentication tab.
Figure 124 shows the authentication parameters available for each
tunnel protocol.
3 Do one of the following:
Choose IPSec from the Protocol pull down menu.
- Use the information in Table 18 to select the IPSec Signature
Algorithm that determines how IPSec packets exchanged
between the ANG and Aurorean users are signed and
verified.
- Use Table 18 to select the Time Period and Data Transferred
values which set how long the key lifetime should last in
terms of time elapsed or kilobytes amassed.
- Click Apply.
For PPTP, no additional work is required. Unlike IPSec, PPTP
does not authenticate individual packets; instead, PPTP relies on
user authentication using MS-CHAP. After the remote user is
authenticated, all PPTP packets are allowed access.
Figure 124 Tunnel Protocol Authentication Window
IPSec
PPTP
Vista de pagina 234
1 2 ... 230 231 232 233 234 235 236 237 238 239 240 ... 275 276

Comentarios a estos manuales

Sin comentarios