
304111-A
Rev 00
v
Contents
Preface
Before You Begin .............................................................................................................xiii
Text Conventions .............................................................................................................xiv
Acronyms ......................................................................................................................... xv
Bay Networks Technical Publications ..............................................................................xvi
How to Get Help .............................................................................................................xvii
Chapter 1
Overview
How IPsec Works ...........................................................................................................1-1
Network Considerations .................................................................................................1-1
Supported Routers ...................................................................................................1-2
Supported WAN Protocols .......................................................................................1-2
IPsec Protection .............................................................................................................1-2
IPsec Tunnel Mode ...................................................................................................1-3
Security Protocols Overview ....................................................................................1-4
Encapsulating Security Payload ........................................................................1-4
Authentication Header .......................................................................................1-4
IPsec Services .........................................................................................................1-5
Chapter 2
Getting Started with IPsec
Security Gateway ............................................................................................................2-2
Security Policies .............................................................................................................2-3
Policy Templates ......................................................................................................2-3
IPsec Policies ...........................................................................................................2-4
Criteria Specification ..........................................................................................2-4
Action Specification ...........................................................................................2-4
Inbound Policies .......................................................................................................2-5
Outbound Policies ....................................................................................................2-5
Comentarios a estos manuales