Documentation Home
> SunScreen 3.2 Configuration Examples
SunScreen 3.2 Configuration Examples
Book Information
Preface
Chapter 1 Introduction
What Is the Configuration Examples Manual?
How SunScreen Works
Network Map
Chapter 2 Setting Up Remote Administration in Routing Mode
Network Example
Routing Prerequisites
Setting Up Remote Administration with SKIP
Setting Up Remote Administration with IKE
Installing a Remote Administration Station
Chapter 3 Configuring Network Address Translation (NAT)
Network Example
Static NAT Example
Dynamic NAT Example
Chapter 4 Configuring a Stealth Mode Screen
Network Example
Stealth Mode Configuration
Chapter 5 Creating a VPN
Basic Encryption Scenario
Basic Encryption Configuration
Advanced Encryption Scenario
Advanced Encryption Configuration
VPN Rules Scenario
Using VPN Rules
Chapter 6 Using High Availability (HA)
Network Example
Setting Up the HA Screens
Preparing Stealth Mode Screens for HA
Preparing Routing Mode Screens for HA
Configuring the HA Cluster
HA Notes
Chapter 7 Creating a Centralized Management Group
Network Example
Centralized Management Group Configuration
Chapter 8 Using Proxies in Mixed-Mode
Network Example
Configuration Considerations
Mixed-Mode Limitation
Using DYNAMIC NAT
Mixed-Mode Configuration
Configuring Proxies for User Authentication
Proxy Considerations
Chapter 9 SunScreen and Windows 2000 IKE Interoperability
Network Example
Using Preshared Keys
Configuring the Screen to Use Preshared Keys
Configuring the Windows 2000 System to Use Preshared Keys
Using CA Signed Certificates
Configuring the Screen to Use CA Signed Certificates
Configuring Windows 2000 to Use CA Signed Certificates
Using the Encryption Action on the Screen
© 2010, Oracle Corporation and/or its affiliates