Cisco PIX 525 Dokumentacja Strona 40

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 466
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 39
1-14
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 1 Getting Started
Creating a Virtual Private Network
LDAP Version 2 and ILS
PIX Firewall Version 6.2 or higher supports using NAT with Lightweight Directory Access Protocol
(LDAP) Version 2, used by the Internet Locator Service (ILS). Applications that depend on ILS include
Microsoft NetMeeting and SiteServer Active Directory. These applications use ILS to provide
registration and location of end points in the ILS directory.
Earlier versions of PIX Firewall supported NetMeeting, but did not provide support for using NAT with
ILS. With the addition of NAT support for LDAP Version 2, PIX
Firewall supports NAT for H.323
sessions established by NetMeeting.
NetBIOS over IP
The PIX Firewall supports NetBIOS over IP connections from the internal network to the external
network. This lets Microsoft client systems on the internal network, possibly using NAT, access servers,
such as Windows NT, located on the external network. This lets security policies encompass Microsoft
environments across the Internet and inside an intranet. It lets you use access controls native to the
Microsoft environment.
Forwarding Multicast Transmissions
The Internet Group Management Protocol (IGMP) is used to dynamically register specific hosts in a
multicast group on a particular LAN with a multicast (MC) router. MC routers efficiently route multicast
data transmissions to the hosts on each LAN in an internetwork that are registered to receive specific
multimedia or other broadcasts.
PIX Firewall Version 6.2 or higher provides the Stub Multicast Routing (SMR) feature. SMR lets the
PIX
Firewall function as a “stub router,” which is a device that acts as an IGMP proxy agent. A stub
router does not operate as a full MC router, but simply forwards IGMP messages between hosts and MC
routers.
Creating a Virtual Private Network
This section introduces Virtual Private Network (VPN) technology and describes how this technology is
implemented by the PIX
Firewall. It contains the following topics:
Virtual Private Networks, page 1-15
IPSec, page 1-15
Internet Key Exchange (IKE), page 1-15
Certification Authorities, page 1-16
Using a Site-to-Site VPN, page 1-17
Supporting Remote Access with a Cisco Easy VPN Server, page 1-18
For basic configuration instructions for using IPSec to create a VPN, refer to Chapter 6, “Configuring
IPSec and Certification Authorities. For configuration instructions and examples to establish site-to-site
VPNs and using certification authorities, refer to Chapter 7, “Site-to-Site VPN Configuration
Examples. For configuration examples and instructions for creating a remote access VPN, refer to
Chapter 8, “Managing VPN Remote Access.
Przeglądanie stron 39
1 2 ... 35 36 37 38 39 40 41 42 43 44 45 ... 465 466

Komentarze do niniejszej Instrukcji

Brak uwag