ZyXEL Communications P-662H Network Router User Manual


 
P-662H/HW-D Series User’s Guide
18 Table of Contents
16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................239
16.3 My IP Address ................................................................................................240
16.4 Secure Gateway Address ..............................................................................241
16.4.1 Dynamic Secure Gateway Address ......................................................241
16.5 VPN Setup Screen ........................................................................................241
16.6 Keep Alive ......................................................................................................243
16.7 VPN, NAT, and NAT Traversal .......................................................................244
16.8 Remote DNS Server ......................................................................................245
16.9 ID Type and Content ......................................................................................245
16.9.1 ID Type and Content Examples ............................................................246
16.10 Pre-Shared Key ............................................................................................247
16.11 Editing VPN Policies ....................................................................................247
16.12 IKE Phases .................................................................................................252
16.12.1 Negotiation Mode ................................................................................253
16.12.2 Diffie-Hellman (DH) Key Groups .........................................................254
16.12.3 Perfect Forward Secrecy (PFS) .........................................................254
16.13 Configuring Advanced IKE Settings ............................................................254
16.14 Manual Key Setup ........................................................................................257
16.14.1 Security Parameter Index (SPI) .........................................................257
16.15 Configuring Manual Key ..............................................................................257
16.16 Viewing SA Monitor .....................................................................................260
16.17 Configuring Global Setting ..........................................................................261
16.18 Telecommuter VPN/IPSec Examples ...........................................................262
16.18.1 Telecommuters Sharing One VPN Rule Example ..............................262
16.18.2 Telecommuters Using Unique VPN Rules Example ...........................263
16.19 VPN and Remote Management ...................................................................264
Chapter 17
Certificates............................................................................................................ 265
17.1 Certificates Overview .....................................................................................265
17.1.1 Advantages of Certificates ....................................................................266
17.2 Self-signed Certificates ..................................................................................266
17.3 Configuration Summary .................................................................................266
17.4 My Certificates ..............................................................................................267
17.5 My Certificate Import .....................................................................................269
17.5.1 Certificate File Formats .........................................................................269
17.6 My Certificate Create ....................................................................................270
17.7 My Certificate Details ....................................................................................272
17.8 Trusted CAs .................................................................................................275
17.9 Trusted CA Import ........................................................................................277
17.10 Trusted CA Details .......................................................................................278
17.11 Trusted Remote Hosts ................................................................................280
17.12 Verifying a Trusted Remote Host’s Certificate ..............................................282