vii
Configuring RADIUS ··················································································· 311
Overview ························································································································································ 311
Configuring a RADIUS scheme ····················································································································· 311
Configuring common parameters ··········································································································· 312
Adding RADIUS servers ························································································································· 315
RADIUS configuration example ····················································································································· 316
Configuration guidelines ································································································································ 322
Configuring login control ············································································· 324
Configuration procedure ································································································································ 324
Login control configuration example ·············································································································· 325
Network requirements ···························································································································· 325
Configuring a login control rule so Host A cannot Telnet to Router ······················································· 325
Configuring a login control rule so Host B cannot access Router through the Web ······························ 326
Configuring ARP ························································································· 328
Overview ························································································································································ 328
Gratuitous ARP ······································································································································ 328
Displaying ARP entries ·································································································································· 328
Creating a static ARP entry ···························································································································· 328
Removing ARP entries ··································································································································· 329
Enabling learning of dynamic ARP entries ····································································································· 329
Configuring gratuitous ARP ··························································································································· 330
Static ARP configuration example ················································································································· 331
Configuring ARP attack protection ······························································ 335
Overview ························································································································································ 335
Configuring periodic sending of gratuitous ARP packets ··············································································· 335
Configuring ARP automatic scanning ············································································································ 336
Configuring fixed ARP ···································································································································· 337
Configuring IPsec VPN ··················································································· 1
Overview ···························································································································································· 1
Recommended configuration procedure ············································································································ 1
Configuring an IPsec connection ······················································································································· 2
Displaying IPsec VPN monitoring information ··································································································· 7
IPsec VPN configuration example ····················································································································· 9
Configuration guidelines ·································································································································· 11
Configuring L2TP ·························································································· 12
Enabling L2TP ················································································································································· 13
Adding an L2TP group ····································································································································· 13
Displaying L2TP tunnel information ················································································································· 19
Client-initiated VPN configuration example ······································································································ 19
Configuring GRE ··························································································· 24
Overview ·························································································································································· 24
Configuring a GRE over IPv4 tunnel ················································································································ 24
Recommended configuration procedure ·································································································· 24
Creating a GRE tunnel ····························································································································· 24
GRE over IPv4 tunnel configuration example ·································································································· 26
Network requirements ······························································································································ 26
Configuration procedure ··························································································································· 26
Verifying the configuration ························································································································ 31
SSL VPN overview ························································································ 32
How SSL VPN works ······································································································································· 32
Advantages of SSL VPN ·································································································································· 33
Configuring SSL VPN gateway ····································································· 34
Recommended configuration procedure ·········································································································· 34