Dil ID: 11
Dil Adı: russia
Dil Kodu: ru5
Dünyanın En Büyük
Elektronik Bilgi Kütüphanesi



ZyWALL 2 Plus User’s Guide
Table of Contents 15
11.1.4.2 Encapsulation ..............................................................................189
11.1.4.3 VPN, NAT, and NAT Traversal .....................................................190
11.1.4.4 SA Life Time ................................................................................191
11.1.4.5 IPSec High Availability .................................................................191
11.2 VPN Rules (IKE) ............................................................................................192
11.3 VPN Rules (IKE) Gateway Policy Edit ...........................................................194
11.4 VPN Rules (IKE): Network Policy Edit .........................................................200
11.5 VPN Rules (IKE): Network Policy Move .......................................................204
11.6 VPN Rules (Manual) ......................................................................................205
11.7 VPN Rules (Manual): Edit ...........................................................................207
11.8 VPN SA Monitor ...........................................................................................210
11.9 VPN Global Setting .......................................................................................211
11.10 Telecommuter VPN/IPSec Examples ...........................................................213
11.10.1 Telecommuters Sharing One VPN Rule Example ...............................213
11.10.2 Telecommuters Using Unique VPN Rules Example ...........................214
11.11 VPN and Remote Management ....................................................................215
Chapter 12
Certificates............................................................................................................ 217
12.1 Certificates Overview .....................................................................................217
12.1.1 Advantages of Certificates ....................................................................218
12.2 Self-signed Certificates ..................................................................................218
12.3 Configuration Summary .................................................................................218
12.4 My Certificates ..............................................................................................219
12.5 My Certificate Import ....................................................................................221
12.5.1 Certificate File Formats .........................................................................221
12.6 My Certificate Create ...................................................................................222
12.7 My Certificate Details ...................................................................................224
12.8 Trusted CAs .................................................................................................227
12.9 Trusted CA Import ........................................................................................229
12.10 Trusted CA Details ......................................................................................230
12.11 Trusted Remote Hosts ................................................................................232
12.12 Verifying a Trusted Remote Host’s Certificate ..............................................234
12.12.1 Trusted Remote Host Certificate Fingerprints .....................................234
12.13 Trusted Remote Hosts Import ....................................................................235
12.14 Trusted Remote Host Certificate Details ....................................................236
12.15 Directory Servers ........................................................................................239
12.16 Directory Server Add or Edit ......................................................................240
Chapter 13
Authentication Server.......................................................................................... 243
13.1 Authentication Server Overview .....................................................................243
13.2 Local User Database ......................................................................................243