Herunterladen Diese Seite drucken

Phoenix Contact TC ROUTER 4002T-4G EU Anwenderhandbuch Seite 197

Industrieller mobilfunk-router mit wlan, vpn und firewall

Werbung

110051_de_02
Bild 4-23:
Interfaces, Serial, Device Server ......................................................... 64
Bild 4-24:
Interfaces, Serial, AT-Modem-Emulator .............................................. 67
Bild 4-25:
Interfaces, Digital I/O .......................................................................... 70
Bild 4-26:
Routing, Static Routes ........................................................................ 72
Bild 4-27:
Routing, Extended Routes .................................................................. 74
Bild 4-28:
Routing, Multipath Routes .................................................................. 75
Bild 4-29:
Routing, Multicast, IGMP proxy .......................................................... 77
Bild 4-30:
Routing, Multicast, Static Routes ........................................................ 78
Bild 4-31:
Routing, Mobile IP, Administration (mobile node) ............................... 82
Bild 4-32:
Network Security, Firewall, Address/Port Groups ............................... 86
Bild 4-33:
Network Security, Firewall, Filtering Rules .......................................... 87
Bild 4-34:
Network Security, NAPT, Masquerading ............................................ 88
Bild 4-35:
Network Security, NAPT, Inbound Rules ............................................ 89
Bild 4-36:
VPN, OpenVPN, Administration .......................................................... 91
Bild 4-37:
VPN, OpenVPN, Tunnel Configuration (Client) ................................... 92
Bild 4-38:
VPN, OpenVPN, Tunnel Configuration (Server) ................................. 94
Bild 4-39:
VPN, OpenVPN, Client Management, Clients .................................... 97
Bild 4-40:
VPN, IPsec, Administration ................................................................. 99
Bild 4-41:
VPN, IPsec, Tunnel Configuration .................................................... 100
Bild 4-42:
VPN, IPsec, Tunnel Configuration, General ...................................... 101
Bild 4-43:
VPN, IPsec, Tunnel Configuration, IKE Proposal, pre-shared
key .................................................................................................... 102
Bild 4-44:
VPN, IPsec, Tunnel Configuration, IKE Proposal, public key in-
frastructure ....................................................................................... 103
Bild 4-45:
VPN, IPsec, Tunnel Configuration, IKE Proposal, extended aut-
hentication ........................................................................................ 104
Bild 4-46:
IKE Proposal, Phase 1 ...................................................................... 105
Bild 4-47:
VPN, IPsec, Tunnel Configuration, IPsec Proposal ........................... 106
Bild 4-48:
VPN, IPsec, Tunnel Configuration, Networks .................................... 107
Bild 4-49:
VPN, PPTP, Administration ............................................................... 108
Bild 4-50:
VPN, PPTP, Tunnel Configuration (Client) ........................................ 109
Bild 4-51:
VPN, PPTP, Tunnel Configuration (Server) ...................................... 110
Bild 4-52:
VPN, PPTP, Client Management ...................................................... 111
Bild 4-53:
VPN, GRE, Tunnel Configuration ...................................................... 112
Bild 4-54:
VPN, L2TP, Tunnel Configuration ..................................................... 113
Bild 4-55:
Services, DHCP Server .................................................................... 115
Bild 4-56:
Services, DNS Server ....................................................................... 116
Bild 4-57:
Services, NTP Server ....................................................................... 117
Abbildungsverzeichnis
Phoenix Contact
197 / 202

Werbung

loading