ZyXEL Communications 2602H Series Network Card User Manual


 
Prestige 2602H/HW Series User’s Guide
18 Table of Contents
16.1.4 VPN Applications ..................................................................................208
16.2 IPSec Architecture .........................................................................................209
16.2.1 IPSec Algorithms ..................................................................................209
16.2.2 Key Management ..................................................................................209
16.3 Encapsulation .................................................................................................209
16.3.1 Transport Mode ....................................................................................210
16.3.2 Tunnel Mode ........................................................................................210
16.4 IPSec and NAT ...............................................................................................210
Chapter 17
VPN Screens......................................................................................................... 213
17.1 VPN/IPSec Overview .....................................................................................213
17.2 IPSec Algorithms ............................................................................................213
17.2.1 AH (Authentication Header) Protocol ...................................................213
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................214
17.3 My IP Address ................................................................................................214
17.4 Secure Gateway Address ..............................................................................215
17.4.1 Dynamic Secure Gateway Address ......................................................215
17.5 VPN Summary Screen ...................................................................................215
17.6 Keep Alive ......................................................................................................217
17.7 Remote DNS Server ......................................................................................217
17.8 NAT Traversal ................................................................................................218
17.8.1 NAT Traversal Configuration .................................................................219
17.9 ID Type and Content ......................................................................................219
17.9.1 ID Type and Content Examples ............................................................220
17.10 Pre-Shared Key ............................................................................................221
17.11 Editing VPN Policies .....................................................................................221
17.12 IKE Phases .................................................................................................226
17.12.1 Negotiation Mode ................................................................................228
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................228
17.12.3 Perfect Forward Secrecy (PFS) .........................................................228
17.13 Configuring Advanced IKE Settings .............................................................228
17.14 Manual Key Setup ........................................................................................231
17.14.1 Security Parameter Index (SPI) .........................................................231
17.15 Configuring Manual Key ...............................................................................232
17.16 Viewing SA Monitor ......................................................................................235
17.17 Configuring Global Setting ...........................................................................237
17.18 Telecommuter VPN/IPSec Examples ...........................................................237
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................237
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................238
17.19 VPN and Remote Management ...................................................................240