![]() ![]() Each secure connection is called a tunnel. Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections between remote users and a private corporate network. Supporting the Nokia VPN Client Tunneling Overview.This chapter describes how to configure the IPsec and ISAKMP standards to build Virtual Private Networks. Configuring an External Server for Security Appliance User Authorization.Managing Software, Licenses, and Configurations.Configuring Tunnel Groups, Group Policies, and Users.Configuring ARP Inspection and Bridging Parameters.Applying Application Layer Protocol Inspection.Configuring AAA Servers and the Local Database.Configuring DHCP, DDNS, and WCCP Services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |