4
Chapter 6: Firewall ........................................................................................................................... 96
IP rules ......................................................................................................................................................96
Services...................................................................................................................................................103
Access rules ............................................................................................................................................107
Internet access ........................................................................................................................................110
Chapter 7: IPsec VPN .................................................................................................................... 113
Overview..................................................................................................................................................113
IPsec components ...................................................................................................................................117
Setting up IPsec tunnels .........................................................................................................................135
NAT traversal...........................................................................................................................................138
CA server access ....................................................................................................................................140
IPsec troubleshooting .............................................................................................................................143
Chapter 8: Authentication.............................................................................................................. 153
Authentication profiles .............................................................................................................................153
RADIUS authentication ...........................................................................................................................154
The radiussnoop command ....................................................................................................................156
Chapter 9: High Availability........................................................................................................... 157
Overview .................................................................................................................................................157
HA mechanisms .....................................................................................................................................159
Setting up HA .........................................................................................................................................161
HA issues ...............................................................................................................................................166
Chapter 10: Advanced Settings .................................................................................................... 168
Flow timeout settings ..............................................................................................................................168
Length limit settings ................................................................................................................................169
Fragmentation settings ...........................................................................................................................171
Local fragment reassembly settings .......................................................................................................176
Chapter 11: I-WLAN........................................................................................................................ 177
I-WLAN overview ....................................................................................................................................177
GTP tunnels.............................................................................................................................................178
Interface stitching ....................................................................................................................................181
Using IP rules .........................................................................................................................................182
Adding client routing ................................................................................................................................182
Certificates with I-WLAN .........................................................................................................................183