
Index
IN-6
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
FTP
application inspection 5-7
downloading software using 11-8
filtering 3-34
logging 1-23
packet capture, example 9-30
redirecting 3-7
secondary ports 1-12
full duplex 2-6
G
gateway addresses 2-12
generating RSA keys 6-10
global addresses
specifying 2-11
global lifetimes
changing 6-19
Group 5
Diffie Hellman 6-3
H
H.245 tunneling 5-16
H.323 5-10, 5-16
changing default port assignments 5-7
hardware clients
See Easy VPN Remote device
using in SOHO networks 4-3
hardware speed
requirements for Stateful Failover 2-6
help, command line 1-30
home offices
See SOHO networks
HTTP
application inspection 5-9
copying configurations 11-5
copying software 11-5
filtering 1-10, 3-34
filtering HTTPS 3-34
packet capture, example 9-30
redirecting 3-7
server access 3-1
Hyptertext Translation Protocol
See HTTP
I
IANA URL D - 5
ICMP
application inspection 5-9, 5-31
Configurable Proxy Pinging 1-11
configuring object groups 3-29
message reassembly 1-10
testing connectivity 2-21
testing default routes 2-24
ICMP-type object groups
configuring 3-29
IDS
support for 1-23
using 9-39 to 9-41
IGMP
support for 1-14
IKE
benefits 6-2
creating policies 6-4
description 1-16
disabling 6-6
policy parameters 6-3
policy priority numbers 6-4
using with pre-shared keys 6-6
Xauth 8-5, 8-6, 8-17, B-17
IKE Mode Config
exceptions for security gateways B-21
standard E-2
IKE Mode Configuration
See IKE Mode Config
Komentáře k této Příručce