{"id":4082,"date":"2024-03-28T05:51:06","date_gmt":"2024-03-28T04:51:06","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/vpn\/configurations-vpn-generiques\/"},"modified":"2024-12-04T05:03:24","modified_gmt":"2024-12-04T04:03:24","slug":"configurations-vpn-generiques","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/fr\/knowledgebase\/configuration-pc-windows-10\/general-3\/gestion-des-connexions-2\/vpn\/configurations-vpn-generiques\/","title":{"rendered":"Configurations VPN g\u00e9n\u00e9riques"},"content":{"rendered":"\n<table id=\"tablepress-329\" class=\"tablepress tablepress-id-329\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=329\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>M\u00e9moriser les informations d&rsquo;identification \u00e0 chaque connexion<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Enregistrer les adresses IP avec le DNS interne<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>R\u00e8gles de filtrage du trafic r\u00e9seau<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Limiter la connexion VPN \u00e0 l&rsquo;ensemble des r\u00e8gles d\u00e9finies.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Liste de recherche de suffixes DNS<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Suffixes DNS \u00e0 ajouter \u00e0 la liste de recherche DNS pour l&rsquo;acheminement des noms courts.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>R\u00e8gles de la table de politique de r\u00e9solution des noms (NRPT)<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Les r\u00e8gles de la table de politique de r\u00e9solution des noms (NRPT) d\u00e9finissent la mani\u00e8re dont le DNS r\u00e9sout les noms lorsqu&rsquo;il est connect\u00e9 au VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>D\u00e9tection des r\u00e9seaux de confiance<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Liste des suffixes DNS permettant d&rsquo;identifier le r\u00e9seau de confiance.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Tunnel divis\u00e9<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Le tunnelage fractionn\u00e9 signifie que le trafic peut passer par n&rsquo;importe quelle interface d\u00e9termin\u00e9e par la pile de r\u00e9seau.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Fractionnement des itin\u00e9raires de tunnelage<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Liste des routes \u00e0 ajouter \u00e0 la table de routage pour l&rsquo;interface VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Configuration du proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Configure le proxy utilis\u00e9 avec ce r\u00e9seau<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adresse du mandataire<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adresse du serveur proxy sous la forme d&rsquo;un nom d&rsquo;h\u00f4te complet ou d&rsquo;une adresse IP.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Port<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Port du serveur proxy.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>URL de configuration automatique du proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>pour r\u00e9cup\u00e9rer automatiquement les param\u00e8tres du proxy.<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"parent":4065,"menu_order":0,"template":"","class_list":["post-4082","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4082\/revisions"}],"predecessor-version":[{"id":13826,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4082\/revisions\/13826"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4065"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/media?parent=4082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}