{"id":662,"date":"2025-09-07T17:28:08","date_gmt":"2025-09-07T13:58:08","guid":{"rendered":"https:\/\/rayka-co.ir\/new\/?post_type=product&#038;p=662"},"modified":"2025-09-07T17:36:00","modified_gmt":"2025-09-07T14:06:00","slug":"simos-300-209","status":"publish","type":"product","link":"https:\/\/rayka-co.ir\/new\/product\/simos-300-209\/","title":{"rendered":"SIMOS 300-209"},"content":{"rendered":"<div style=\"direction: rtl; text-align: right; font-family: Vazir, Tahoma, sans-serif; line-height: 1.8; padding: 20px;\">\n<p>  <!-- \u0648\u06cc\u062f\u06cc\u0648 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<div style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;\">\n      <iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\"\n              src=\"https:\/\/www.aparat.com\/video\/video\/embed\/videohash\/lwcx9\/vt\/frame\"\n              frameborder=\"0\" allowfullscreen><br \/>\n      <\/iframe>\n    <\/div>\n<\/p><\/div>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627 --><\/p>\n<h2 style=\"margin-bottom: 1em;\">\u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 1 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>The Role of VPNs in Network Security<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0646\u0642\u0634 VPN\u0647\u0627 \u062f\u0631 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0648 \u0627\u0647\u0645\u06cc\u062a \u0622\u0646\u200c\u0647\u0627 \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0645\u0646.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 2 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>VPNs and Cryptography<\/h3>\n<p>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0622\u0646 \u062f\u0631 VPN\u0647\u0627 \u0628\u0631\u0627\u06cc \u062d\u0641\u0627\u0638\u062a \u0627\u0632 \u062f\u0627\u062f\u0647\u200c\u0647\u0627.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 3 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Key Management<\/h3>\n<p>\u0645\u062f\u06cc\u0631\u06cc\u062a \u06a9\u0644\u06cc\u062f\u0647\u0627\u06cc \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0628\u0631\u0627\u06cc \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 \u0627\u0632 \u0627\u0645\u0646\u06cc\u062a \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 4 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Site-to-Site VPN Solutions and Technologies<\/h3>\n<p>\u0645\u0639\u0631\u0641\u06cc \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627 \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc\u200c\u0647\u0627\u06cc \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 Site-to-Site VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 5 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>IPSec Site-to-Site VPN Deployment Methods<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc IPSec \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a Site-to-Site VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 6 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Implementing IPSec with Crypto Map<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc IPSec \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Crypto Map \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0645\u0646.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 7 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Aggresive Mode in Crypto Map IPSec<\/h3>\n<p>\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062d\u0627\u0644\u062a Aggressive \u062f\u0631 Crypto Map \u0628\u0631\u0627\u06cc \u0628\u0647\u0628\u0648\u062f \u0639\u0645\u0644\u06a9\u0631\u062f IPSec.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 8 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>IPSec VTI<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc Virtual Tunnel Interface (VTI) \u062f\u0631 IPSec \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0633\u0627\u062f\u0647\u200c\u062a\u0631.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 9 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Dynamic VTI<\/h3>\n<p>\u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc Dynamic VTI \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u067e\u0648\u06cc\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 10 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GRE Tunnel<\/h3>\n<p>\u0627\u06cc\u062c\u0627\u062f \u062a\u0648\u0646\u0644 GRE \u0628\u0631\u0627\u06cc \u0627\u0646\u062a\u0642\u0627\u0644 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 11 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GRE Over IPSec<\/h3>\n<p>\u062a\u0631\u06a9\u06cc\u0628 GRE \u0648 IPSec \u0628\u0631\u0627\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0627\u0646\u0639\u0637\u0627\u0641\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 12 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>RSA Signature Based Authentication in Site-to-Site VPN<\/h3>\n<p>\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0627\u0645\u0636\u0627\u06cc RSA \u062f\u0631 Site-to-Site VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 13 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Implementing RSA Signature Based Authentication in Site-to-Site VPN<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0639\u0645\u0644\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0627\u0645\u0636\u0627\u06cc RSA \u062f\u0631 VPN.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 14 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Stateless Failover with cryptomap IPSec<\/h3>\n<p>\u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc Failover \u0628\u062f\u0648\u0646 \u062d\u0627\u0644\u062a \u062f\u0631 IPSec \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Crypto Map.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 15 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>HA with dynamic routing Protocol in IPSec<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc High Availability \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0645\u0633\u06cc\u0631\u06cc\u0627\u0628\u06cc \u067e\u0648\u06cc\u0627 \u062f\u0631 IPSec.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 16 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>DMVPN Phase 1<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc DMVPN Phase 1 \u0628\u0631\u0627\u06cc \u062a\u0648\u067e\u0648\u0644\u0648\u0698\u06cc Hub-and-Spoke.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 17 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>DMVPN Phase 2<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc DMVPN Phase 2 \u0628\u0631\u0627\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0627\u0632 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a Spoke-to-Spoke.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 18 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>DMVPN Phase 3 Theory<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0645\u0641\u0627\u0647\u06cc\u0645 \u062a\u0626\u0648\u0631\u06cc DMVPN Phase 3 \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u067e\u06cc\u0634\u0631\u0641\u062a\u0647.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 19 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Deploying DMVPN Phase 3<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0639\u0645\u0644\u06cc DMVPN Phase 3 \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a Spoke-to-Spoke.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 20 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Dual Hub Dual DMVPN<\/h3>\n<p>\u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc Dual Hub Dual DMVPN \u0628\u0631\u0627\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 Redundancy.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 21 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Dual Hub Single DMVPN<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc Dual Hub Single DMVPN \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0627\u0641\u0632\u0648\u0646\u06af\u06cc \u062f\u0631 \u0634\u0628\u06a9\u0647.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 22 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Hierarchical DMVPN<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc DMVPN \u0628\u0647 \u0635\u0648\u0631\u062a \u0633\u0644\u0633\u0644\u0647\u200c\u0645\u0631\u0627\u062a\u0628\u06cc \u0628\u0631\u0627\u06cc \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0628\u0632\u0631\u06af.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 23 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Hierarchical DMVPN phase 3<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0641\u0627\u0632 \u0633\u0648\u0645 DMVPN \u0628\u0647 \u0635\u0648\u0631\u062a \u0633\u0644\u0633\u0644\u0647\u200c\u0645\u0631\u0627\u062a\u0628\u06cc \u0628\u0631\u0627\u06cc \u0645\u0642\u06cc\u0627\u0633\u200c\u067e\u0630\u06cc\u0631\u06cc.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 24 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GET VPN Concept<\/h3>\n<p>\u0645\u0639\u0631\u0641\u06cc \u0645\u0641\u0627\u0647\u06cc\u0645 GET VPN \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0645\u0646 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u06af\u0633\u062a\u0631\u062f\u0647.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 25 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GET VPN Implementation<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0639\u0645\u0644\u06cc GET VPN \u0628\u0631\u0627\u06cc \u0627\u06cc\u062c\u0627\u062f \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0645\u0646.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 26 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GET VPN with Multicast Rekey<\/h3>\n<p>\u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc GET VPN \u0628\u0627 \u0642\u0627\u0628\u0644\u06cc\u062a Multicast Rekey \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u06a9\u0644\u06cc\u062f\u0647\u0627.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 27 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>GET VPN COOPS<\/h3>\n<p>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc COOPS \u062f\u0631 GET VPN \u0628\u0631\u0627\u06cc \u0628\u0647\u0628\u0648\u062f \u0627\u0645\u0646\u06cc\u062a \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a.<\/p>\n<\/p><\/div>\n<hr>\n<p>  <!-- \u0633\u0631\u0641\u0635\u0644 28 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\n","protected":false},"excerpt":{"rendered":"<article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:839113a8-f8ee-4e94-a47e-d531c1fa55fe-9\" data-testid=\"conversation-turn-20\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[72rem]:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\">\n<div class=\"flex max-w-full flex-col grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"46eb3a79-f63e-4b14-b5f1-0c249d130ba8\" data-message-model-slug=\"gpt-4o\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose dark:prose-invert w-full break-words light markdown-new-styling\">\n<article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:839113a8-f8ee-4e94-a47e-d531c1fa55fe-11\" data-testid=\"conversation-turn-24\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[72rem]:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\">\n<div class=\"flex max-w-full flex-col grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"ffcdbcf3-98e5-4374-8115-d4da193331ee\" data-message-model-slug=\"gpt-4o\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose dark:prose-invert w-full break-words light markdown-new-styling\">\n<p data-start=\"0\" data-end=\"580\" data-is-last-node=\"\" data-is-only-node=\"\">\u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u06a9\u0647 \u06cc\u06a9\u06cc \u0627\u0632 \u0686\u0647\u0627\u0631 \u062f\u0648\u0631\u0647 \u0627\u0635\u0644\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u06a9\u0648 \u0627\u0633\u062a\u060c \u0628\u0647\u200c\u0637\u0648\u0631 \u062c\u0627\u0645\u0639 \u0645\u0628\u0627\u062d\u062b <strong data-start=\"72\" data-end=\"92\">Site-to-Site VPN<\/strong> \u0648 <strong data-start=\"95\" data-end=\"116\">Remote Access VPN<\/strong> \u0622\u0645\u0648\u0632\u0634 \u062f\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0627\u0628\u062a\u062f\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647\u200c\u0627\u06cc \u0645\u0627\u0646\u0646\u062f <strong data-start=\"163\" data-end=\"179\">Cryptography<\/strong> \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644 <strong data-start=\"189\" data-end=\"198\">IPSec<\/strong> \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u0648 \u0633\u067e\u0633 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc Site-to-Site VPN \u0634\u0627\u0645\u0644 <strong data-start=\"266\" data-end=\"316\">Crypto Map\u060c Static\/Dynamic VTI\u060c GRE over IPSec<\/strong> \u0648 \u0628\u0647\u200c\u0648\u06cc\u0698\u0647 <strong data-start=\"327\" data-end=\"336\">DMVPN<\/strong> \u062f\u0631 \u0641\u0627\u0632\u0647\u0627\u06cc 1\u060c 2 \u0648 3 \u0628\u0647\u200c\u0635\u0648\u0631\u062a \u06a9\u0627\u0645\u0644 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0648 \u062a\u062d\u0644\u06cc\u0644 \u062e\u0648\u0627\u0647\u0646\u062f \u0634\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0645\u0628\u0627\u062d\u062b \u067e\u06cc\u0634\u0631\u0641\u062a\u0647\u200c\u0627\u06cc \u0645\u0627\u0646\u0646\u062f <strong data-start=\"429\" data-end=\"451\">Hierarchical DMVPN<\/strong>\u060c \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc <strong data-start=\"463\" data-end=\"477\">Redundancy<\/strong> \u0648 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc <strong data-start=\"489\" data-end=\"500\">GET VPN<\/strong> \u0645\u0639\u0631\u0641\u06cc \u0645\u06cc\u200c\u0634\u0648\u0646\u062f. \u062f\u0631 \u0628\u062e\u0634 Remote Access VPN\u060c \u0628\u0627 <strong data-start=\"545\" data-end=\"556\">SSL VPN<\/strong> \u0648 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc <strong data-start=\"567\" data-end=\"581\">Clientless<\/strong> (\u0628\u0647 \u0647\u0645\u0631\u0627\u0647 Plugin\u060c Port Forwarding \u0648 Smart Tunnel) \u0648 <strong data-start=\"634\" data-end=\"650\">Client-based<\/strong> \u0628\u0627 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 AnyConnect \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f. \u062f\u0631 \u067e\u0627\u06cc\u0627\u0646 \u0646\u06cc\u0632 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u062c\u062f\u06cc\u062f \u0648 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632 <strong data-start=\"730\" data-end=\"741\">FlexVPN<\/strong> \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 IPSec \u0648 IKEv2 \u0645\u0639\u0631\u0641\u06cc \u0648 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u062e\u0648\u0627\u0647\u062f \u0634\u062f \u06a9\u0647 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062f\u063a\u0627\u0645 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 Site-to-Site \u0648 Remote Access VPN \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/article>\n","protected":false},"featured_media":663,"comment_status":"open","ping_status":"closed","template":"","meta":[],"pwb-brand":[29],"product_brand":[],"product_cat":[81],"product_tag":[],"class_list":{"0":"post-662","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"pwb-brand-majid-asadpoor","7":"product_cat-security","8":"post","10":"first","11":"instock","12":"downloadable","13":"virtual","14":"purchasable","15":"product-type-simple"},"brands":[{"id":29,"name":"\u0645\u062c\u06cc\u062f \u0627\u0633\u062f\u067e\u0648\u0631","slug":"majid-asadpoor"}],"_links":{"self":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product\/662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/comments?post=662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media\/663"}],"wp:attachment":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media?parent=662"}],"wp:term":[{"taxonomy":"pwb-brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/pwb-brand?post=662"},{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_brand?post=662"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_cat?post=662"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_tag?post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}