
II
5.2 Methods......................................................................................................................38
5.3 Steps...........................................................................................................................39
5.3.1 Telnet.........................................................................................................................................39
5.3.2 WWW.........................................................................................................................................39
5.3.3 SNMP.........................................................................................................................................39
5.3.4 ICMP..........................................................................................................................................39
Chapter 6 NAT.........................................................................................................40
6.1 Demands.....................................................................................................................40
6.2 Objectives...................................................................................................................41
6.3 Methods......................................................................................................................41
6.4 Steps...........................................................................................................................42
6.4.1 Setup Many-to-one NAT rules.....................................................................................................42
6.4.2 Setup Virtual ServerfortheFtpServer1.......................................................................................46
6.5 NAT modes introduction..............................................................................................50
6.5.1 Many-to-One type.......................................................................................................................50
6.5.2 Many-to-Manytype.....................................................................................................................51
6.5.3 One-to-One type.........................................................................................................................51
6.5.4 NAT modes & types....................................................................................................................52
Chapter 7 Routing...................................................................................................53
7.1 Demands.....................................................................................................................53
7.2 Objectives...................................................................................................................54
7.3 Methods......................................................................................................................54
7.4 Steps...........................................................................................................................54
7.4.1 Add a static routing entry............................................................................................................54
7.4.2 Add a policyrouting entry...........................................................................................................56
Chapter 8 Firewall...................................................................................................59
8.1 Demands.....................................................................................................................59
8.2 Objectives...................................................................................................................59
8.3 Methods......................................................................................................................59
8.4 Steps...........................................................................................................................60
8.4.1 Block internalPC session(LAN àWAN)....................................................................................60
8.4.2 Setup Alertdetectedattack.........................................................................................................63
Chapter 9 VPN Technical Introduction..................................................................65
9.1 VPN benefit.................................................................................................................65
9.2 Related TerminologyExplanation...............................................................................65
9.2.1 VPN...........................................................................................................................................65
9.2.2 IPSec.........................................................................................................................................65
9.2.3 SecurityAssociation...................................................................................................................65
9.2.4 IPSec Algorithms........................................................................................................................65
9.2.5 KeyManagement.......................................................................................................................66
9.2.6 Encapsulation.............................................................................................................................67