13.9.2 Configuration example: ............................................................................................. 443
14 Redundancy management ............................................................................................... 445
14.1 VRRP configuration........................................................................................................... 445
14.1.1 Configuration algorithm ............................................................................................ 445
14.1.2 Configuration example 1 ........................................................................................... 448
14.1.3 Configuration example 2 ........................................................................................... 449
14.2 VRRP tracking configuration............................................................................................ 451
14.2.1 Configuration algorithm ............................................................................................ 451
14.2.2 Configuration example .............................................................................................. 455
15 Remote access configuration .......................................................................................... 457
15.1 Configuring server for remote access to corporate network via PPTP protocol.......... 457
15.1.1 Configuration algorithm ............................................................................................ 457
15.1.2 Configuration example .............................................................................................. 460
15.2 Configuring server for remote access to corporate network via L2TP protocol .......... 462
15.2.1 Configuration algorithm ............................................................................................ 462
15.2.2 Configuration example .............................................................................................. 466
15.3 Configuring server for remote access to corporate network via OpenVPN protocol... 468
15.3.1 Configuration algorithm ............................................................................................ 468
15.3.2 Configuration example .............................................................................................. 472
15.4 Configuring remote access client via PPPoE.................................................................. 474
15.4.1 Configuration algorithm ............................................................................................ 474
15.4.2 Configuration example .............................................................................................. 476
15.5 Configuring remote access client via PPTP.................................................................... 478
15.5.1 Configuration algorithm ............................................................................................ 478
15.5.2 Configuration example .............................................................................................. 480
15.6 Configuring remote access client via L2TP .................................................................... 481
15.6.1 Configuration algorithm ............................................................................................ 482
15.6.2 Configuration example .............................................................................................. 484
16 Service management........................................................................................................ 486
16.1 DHCP server configuration............................................................................................... 486
16.1.1 Configuration algorithm ............................................................................................ 486
16.1.2 Configuration example .............................................................................................. 490
16.2 Destination NAT configuration ........................................................................................ 492
16.2.1 Configuration algorithm ............................................................................................ 493
16.2.2 Destination NAT configuration example .................................................................. 495
16.3 Source NAT configuration................................................................................................ 497
16.3.1 Configuration algorithm ............................................................................................ 497