ZyXEL Communications 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series User Manual

Page 18

Advertising
background image

P-662H/HW-D Series User’s Guide

18

Table of Contents

16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................239

16.3 My IP Address ................................................................................................240
16.4 Secure Gateway Address ..............................................................................241

16.4.1 Dynamic Secure Gateway Address ......................................................241

16.5 VPN Setup Screen ........................................................................................241
16.6 Keep Alive ......................................................................................................243
16.7 VPN, NAT, and NAT Traversal .......................................................................244
16.8 Remote DNS Server ......................................................................................245
16.9 ID Type and Content ......................................................................................245

16.9.1 ID Type and Content Examples ............................................................246

16.10 Pre-Shared Key ............................................................................................247
16.11 Editing VPN Policies ....................................................................................247
16.12 IKE Phases .................................................................................................252

16.12.1 Negotiation Mode ................................................................................253
16.12.2 Diffie-Hellman (DH) Key Groups .........................................................254
16.12.3 Perfect Forward Secrecy (PFS) .........................................................254

16.13 Configuring Advanced IKE Settings ............................................................254
16.14 Manual Key Setup ........................................................................................257

16.14.1 Security Parameter Index (SPI) .........................................................257

16.15 Configuring Manual Key ..............................................................................257
16.16 Viewing SA Monitor .....................................................................................260
16.17 Configuring Global Setting ..........................................................................261
16.18 Telecommuter VPN/IPSec Examples ...........................................................262

16.18.1 Telecommuters Sharing One VPN Rule Example ..............................262
16.18.2 Telecommuters Using Unique VPN Rules Example ...........................263

16.19 VPN and Remote Management ...................................................................264

Chapter 17
Certificates............................................................................................................
265

17.1 Certificates Overview .....................................................................................265

17.1.1 Advantages of Certificates ....................................................................266

17.2 Self-signed Certificates ..................................................................................266
17.3 Configuration Summary .................................................................................266
17.4 My Certificates ..............................................................................................267
17.5 My Certificate Import .....................................................................................269

17.5.1 Certificate File Formats .........................................................................269

17.6 My Certificate Create ....................................................................................270
17.7 My Certificate Details ....................................................................................272
17.8 Trusted CAs .................................................................................................275
17.9 Trusted CA Import ........................................................................................277
17.10 Trusted CA Details .......................................................................................278
17.11 Trusted Remote Hosts ................................................................................280
17.12 Verifying a Trusted Remote Host’s Certificate ..............................................282

Advertising
This manual is related to the following products: