HP 7000 dl Router Series Guide de l'utilisateur Page 602

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 941
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 601
SROS Command Line Interface Reference Guide Frame Relay Sub-Interface Config Command Set
5991-2114 © Copyright 2005 Hewlett-Packard Development Company, L.P. 602
As shown in the diagram above, data coming into the product is first processed by the static filter
associated with the interface on which the data is received. This access-group is a true static filter and is
available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted) it
is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection
firewall. Therefore, given a terminating VPN tunnel, only un-encrypted data is processed by the firewall.
The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy-class on an
interface. When specifying the ACLs for a crypto map, the source information is the private local-side,
un-encrypted source of the data. The destination information will be the far-end, un-encrypted destination
of the data. However, ACLs for a policy-class work in reverse. The source information for the ACL in a
policy-class is the far-end. The destination information is the local-side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the frame-relay interface:
(config-fr 1.16)#crypto map MyMap
Interfaces (Ethernet, Frame Relay, PPP, local)
Static Filter
(in)
Static Filter
(out)
IPSec
Decrypt/Discard
IPSec
Encrypt
NAT/ACP/
Firewall
Router
Vue de la page 601
1 2 ... 597 598 599 600 601 602 603 604 605 606 607 ... 940 941

Commentaires sur ces manuels

Pas de commentaire