ZyXEL Communications ZyXEL ZyWALL P1 User Manual

Page 14

Advertising
background image

ZyWALL P1 User’s Guide

Table of Contents

13

8.1.4.2 Accessing Network Resources When NAT Is Enabled .................124
8.1.4.3 Unsupported IP Applications .........................................................124

8.2 IPSec Architecture ...........................................................................................125

8.2.1 IPSec Algorithms ....................................................................................125
8.2.2 Key Management ....................................................................................125

8.3 Encapsulation ...................................................................................................125

8.3.1 Transport Mode ......................................................................................126
8.3.2 Tunnel Mode ...........................................................................................126

8.4 IPSec and NAT .................................................................................................126

Chapter 9
VPN Screens.........................................................................................................
129

9.1 VPN/IPSec Overview .......................................................................................129
9.2 IPSec Algorithms ..............................................................................................129

9.2.1 AH (Authentication Header) Protocol ......................................................129
9.2.2 ESP (Encapsulating Security Payload) Protocol ....................................129

9.3 My ZyWALL ......................................................................................................130
9.4 Secure Gateway Address ................................................................................130

9.4.1 Dynamic Secure Gateway Address ........................................................131
9.4.2 Nailed Up ................................................................................................131

9.5 NAT Traversal ..................................................................................................131

9.5.1 NAT Traversal Configuration ...................................................................132
9.5.2 X-Auth (Extended Authentication) ..........................................................132
9.5.3 Authentication Server .............................................................................132

9.6 ID Type and Content ........................................................................................133

9.6.1 ID Type and Content Examples ..............................................................134

9.7 Pre-Shared Key ................................................................................................134
9.8 IKE VPN Rule Summary Screen ......................................................................135

9.8.1 Configurign an IKE VPN Rule .................................................................135
9.8.2 Configuring an IKE VPN Policy ...............................................................140

9.8.2.1 Activating a VPN Connection ........................................................144

9.9 Viewing SA Monitor ..........................................................................................144
9.10 Configuring Global Setting .............................................................................145
9.11 Telecommuter VPN/IPSec Examples .............................................................146

9.11.1 Telecommuters Sharing One VPN Rule Example .................................147
9.11.2 Telecommuters Using Unique VPN Rules Example .............................147

9.12 VPN and Remote Management .....................................................................149

Chapter 10
Certificates............................................................................................................
151

10.1 Certificates Overview .....................................................................................151

10.1.1 Advantages of Certificates ....................................................................152

10.2 Self-signed Certificates ..................................................................................152

Advertising