beautypg.com
vii
Configuring ARP attack protection ························································································································· 360
Overview ······································································································································································· 360
Configuring periodic sending of gratuitous ARP packets ························································································ 360
Configuring ARP automatic scanning ························································································································ 361
Configuring fixed ARP ················································································································································· 362
Configuring IPsec VPN ················································································································································ 1
Overview ············································································································································································ 1
Recommended configuration procedure························································································································· 1
Configuring an IPsec connection ····································································································································· 2
Displaying IPsec VPN monitoring information ··············································································································· 8
IPsec VPN configuration example ··································································································································· 9
Configuration guidelines ··············································································································································· 11
Configuring L2TP ························································································································································ 12
Enabling L2TP ································································································································································· 13
Adding an L2TP group ·················································································································································· 13
Displaying L2TP tunnel information ······························································································································ 20
Client-initiated VPN configuration example ················································································································ 20
Configuring GRE ························································································································································ 25
Overview ········································································································································································· 25
Configuring a GRE over IPv4 tunnel ···························································································································· 25
Recommended configuration procedure ············································································································· 25
Creating a GRE tunnel ·········································································································································· 26
GRE over IPv4 tunnel configuration example ·············································································································· 27
SSL VPN overview ······················································································································································ 34
How SSL VPN works ······················································································································································ 34
Advantages of SSL VPN ················································································································································ 35
Configuring SSL VPN gateway ································································································································· 36
Recommended configuration procedure······················································································································ 36
Configuring the SSL VPN service ································································································································· 37
Configuring Web proxy server resources ··················································································································· 39
Configuring TCP application resources ······················································································································· 41
Configuring a remote access service resource ··································································································· 42
Configuring a desktop sharing service resource ······························································································· 43
Configuring an email service resource ··············································································································· 44
Configuring a Notes service resource ················································································································· 45
Configuring a common TCP service resource ···································································································· 47
Configuring IP network resources ································································································································· 48
Recommended configuration procedure ············································································································· 48
Configuring global parameters ···························································································································· 48
Configuring host resources ··································································································································· 49
Configuring a user-IP binding ······························································································································ 51
Configuring a predefined domain name ············································································································ 52
Configuring a resource group ······································································································································ 53
Configuring local users ·················································································································································· 55
Adding a local user manually ······························································································································ 55
Importing local users in bulk ································································································································ 57
Configuring a user group ·············································································································································· 58
Viewing user information ·············································································································································· 60
Viewing online user information ·························································································································· 60
Logging out an online user ··································································································································· 60
Viewing history user information ························································································································· 60