Bay Networks Baystream 7 Instrukcja Użytkownika Strona 17

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 19
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 16
16 White Paper Understanding and Implementing Dial VPN Services
Appendix A — A Dial VPN Checklist
Supports both Layer 2 and Layer 3 tunneling,or intends to support both.
Provides solid and comprehensive solutions that aid the network administrator
in quickly diagnosing errors and implementing fixes without having to disable any
of the equipment that is providing service in real-time.
Is scalable,specifically with equipment and network management,as well as
network architecture.
Prevents breaches,either directly or indirectly,through its accommodation of external
security devices.
Both subscribers, typically corporations and ISPs,and individual users are authenticated
to the network.
Authenticated users are authorized to use the various services of the VPN.
Provides system level security to its subscribers.
The configuration of network elements (e.g. remote access concentrators,gateways,
switches,routers) is as simple and straightforward to use as possible.
Provides network operators the ability to modify network parameters;add,remove,
or change the location of equipment;or reconfigure the network dynamically,
without having to bring down the entire network,or even portions of it.
Provides the full suite of functionality necessary for managing a network:
network design,network simulation and validation,network visualization,and
network operations tools.
Offers some level of integration with best-of-breed vendors for functionality such
as multivendor billing applications,network design and validation tools,along with
monitoring and troubleshooting capabilities.
At a minimum integrates into,but hopefully leverages,the tools in the existing
network environment.
Requires no modifications or upgrades to subscriber customer premise equipment,
or to remote client software.
No addressing changes are needed.Non-globally unique or overlapping IP addresses
are allowed.
Provides complete,accurate documentation that assists network managers and
network planners in the initial installation and ongoing management of the network.
Review this checklist when youre determining which vendor to use for a VPN:
Przeglądanie stron 16
1 2 ... 12 13 14 15 16 17 18 19

Komentarze do niniejszej Instrukcji

Brak uwag