
8.1. Normal LDAP Authentication ......................................................................... 533
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 ......................................... 534
8.3. User Identity Awareness ................................................................................ 550
8.4. The Identity Awareness Agent Interface ........................................................... 554
9.1. The AH protocol ........................................................................................... 589
9.2. The ESP protocol .......................................................................................... 590
9.3. PPTP Client Usage ........................................................................................ 628
9.4. An L2TPv3 Example ...................................................................................... 630
9.5. SSL VPN Browser Connection Choices ............................................................. 640
9.6. The SSL VPN Client Login ............................................................................... 641
9.7. The SSL VPN Client Statistics .......................................................................... 642
9.8. Certificate Validation Components .................................................................. 647
10.1. Pipe Rules Determine Pipe Usage .................................................................. 660
10.2. FwdFast Rules Bypass Traffic Shaping ............................................................. 661
10.3. Differentiated Limits Using Chains ................................................................ 665
10.4. The Eight Pipe Precedences ......................................................................... 666
10.5. Minimum and Maximum Pipe Precedence ...................................................... 667
10.6. Traffic Grouped By IP Address ....................................................................... 671
10.7. A Basic Traffic Shaping Scenario .................................................................... 675
10.8. IDP Traffic Shaping P2P Scenario ................................................................... 682
10.9. A Server Load Balancing Configuration .......................................................... 687
10.10. Connections from Three Clients .................................................................. 690
10.11. Stickiness and Round-Robin ....................................................................... 691
10.12. Stickiness and Connection-rate ................................................................... 691
D.1. The 7 Layers of the OSI Model ........................................................................ 759
Clavister cOS Core
10
Comentarios a estos manuales