{"id":3951,"date":"2024-03-28T07:54:23","date_gmt":"2024-03-28T06:54:23","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/vpn\/"},"modified":"2024-12-04T05:01:10","modified_gmt":"2024-12-04T04:01:10","slug":"vpn","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/es\/knowledgebase\/configuracion-de-macos\/gestion-de-conexiones\/vpn\/","title":{"rendered":"VPN"},"content":{"rendered":"\n<p>Dependiendo del Tipo de Conexi\u00f3n seleccionado, pueden aparecer diferentes campos.<\/p>\n\n<table id=\"tablepress-352\" class=\"tablepress tablepress-id-352\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=352\" rel=\"nofollow\">Edita<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Nombre de la conexi\u00f3n<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nombre del perfil VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Tipo de VPN<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>VPN<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Todo el tr\u00e1fico de red del dispositivo se enrutar\u00e1 a trav\u00e9s de una conexi\u00f3n VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Tipo de conexi\u00f3n<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Establecer tipo de conexi\u00f3n VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>IPsec (cisco)<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protocolo IPsec de Cisco<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>L2TP<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protocolo L2TP<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>SSL personalizado<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Conexi\u00f3n mediante SSL personalizado<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>IKEv2<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protocolo IKEv2<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Configuraci\u00f3n del proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Configuraci\u00f3n de un proxy para la conexi\u00f3n VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Ninguno<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>No establecer Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Manual<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Establecer manualmente un Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>URL del servidor proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Direcci\u00f3n para acceder a la Configuraci\u00f3n del Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Puerto<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Establecer el puerto para el Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Autenticaci\u00f3n<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nombre de usuario para la autenticaci\u00f3n en el Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Contrase\u00f1a<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Contrase\u00f1a para la autenticaci\u00f3n en el Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Autom\u00e1tico<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Establecer un Proxy autom\u00e1ticamente<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>URL del servidor proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>URL para acceder a la configuraci\u00f3n del Proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":3982,"menu_order":0,"template":"","class_list":["post-3951","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/knowledgebase\/3951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/knowledgebase\/3951\/revisions"}],"predecessor-version":[{"id":15464,"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/knowledgebase\/3951\/revisions\/15464"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/knowledgebase\/3982"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/es\/wp-json\/wp\/v2\/media?parent=3951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}