110
C
HAPTER
7: S
ETTING A
P
OLICY
Selecting Remote
Management
When remote management is selected, a Management SA is
automatically generated. The Management SA uses Manual Keying to set
up a VPN tunnel between the Firewall and the VPN client. The
Management SA also defines Inbound and Outbound Security Parameter
Indices (SPIs) which match the last eight digits of the Firewall’s serial
number. The preset SPIs are displayed in the Security Association
Information section.
1
Enter a 16 character hexadecimal encryption key in the Encryption Key
field or use the randomly generated key that appears in the Encryption
Key field. Valid hexadecimal characters are 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E
and F. An example of a valid encryption key is:
1234567890ABCDEF
2
Enter a 32 character hexadecimal authentication key in the
Authentication Key field or use the randomly generated key that appears
in the Authentication Key field. An example of a valid authentication key
is:
1234567890ABCDEF1234567890ABCDEF
.
3
Click the
Update
button and then restart the Firewall for the change to
take effect.
Using the Firewall
with the NBX 100
Business Telephone
System
3Com recommends that you place your NBX 100 Processor on the LAN
port of the Firewall. This is to ensure that your telephone system is
completely secure from hackers on the Internet. If you wish to use NBX
phones on the WAN or DMZ ports of the Firewall, then you must open a
specific port on the Firewall. Do this by following these simple steps:
1
Access the Web interface from a Web browser.
2
Click on the
Policy
button.
3
Click the
Add Service
tab.
4
Type in NBX for the Name of the service.
5
Select UDP for the protocol type and enter 2093 as the Port number.
6
Click
Add
.
7
Click on the
Policy Rules
tab.
8
Click
Allow
, and select NBX from the pull down menu.
9
Click
WAN
or
DMZ
for the Source and select
LAN
for the Destination.
10
Click
Update
and restart the Firewall.
DUA1611-0AAA02.book Page 110 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...