
Index
IN-7
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
ILS
application inspection 5-28
feature 1-14
IM 5-24
images, software
See also software images
upgrading 1-24, 11-5 to 11-16
inbound connectivity 3-2
Individual user authentication
See IUA
in-house CA, configuring 7-13
Instant Messaging
See IM
interfaces
assigning names 2-5
changing names 2-6
configuring 2-4
global address 2-11
logical 2-34
perimeter 2-10
security levels and 1-4
speed 2-6
Internet Group Management Protocol
See IGMP
Internet Key Exchange
See IKE
Internet Locator Service
See ILS
Internet Security Association and Key Management
Protocol
See ISAKMP
Intrusion Detection System
See IDS
IOS
See Cisco IOS CLI
IP
datagrams B-9
viewing configuration 2-5
IP addresses
configuring
address, IP addresses 2-5
IP Phones
See Cisco IP Phones
IPSec
ACLs 6-17
clearing SAs 6-29
configuring 6-13
crypto map entries 6-15
crypto map load sharing 6-28
defined 1-15
enabling debug B-15
manual 6-19
manual SAs using pre-shared keys 6-15
modes B-9
proxies B-9
viewing configuration 6-29
viewing information 6-29
IP Security Protocol
See IPSec
IP spoofing
protection from 1-9
ISAKMP E-2
IUA
described 1-18
Easy VPN Remote device 4-8
enabled on Easy VPN Server 8-4
J
Java applets
filtering 1-10, 3-31
Komentarze do niniejszej Instrukcji