ZyXEL Communications 792H User Manual

Page 17

Advertising
background image

Prestige 792H G.SHDSL Router

Table of Contents

xi

13.2

IPSec Architecture ...................................................................................................................13-3

13.2.1

IPSec Algorithms .....................................................................................................................13-4

13.2.2

Key Management .....................................................................................................................13-4

13.3

Encapsulation ...........................................................................................................................13-5

13.3.1

Transport Mode........................................................................................................................13-5

13.3.2

Tunnel Mode ............................................................................................................................13-5

13.4

IPSec and NAT ........................................................................................................................13-5

Chapter 14 VPN Screens ...........................................................................................................................14-1

14.1

VPN/IPSec Overview...............................................................................................................14-1

14.2

IPSec Algorithms .....................................................................................................................14-1

14.2.1

AH (Authentication Header) Protocol......................................................................................14-1

14.2.2

ESP (Encapsulating Security Payload) Protocol ......................................................................14-1

14.3

My IP Address..........................................................................................................................14-2

14.4

Secure Gateway Address..........................................................................................................14-2

14.4.1

Dynamic Secure Gateway Address ..........................................................................................14-2

14.5

VPN Summary Screen .............................................................................................................14-3

14.6

Keep Alive ...............................................................................................................................14-5

14.7

ID Type and Content................................................................................................................14-5

14.7.1

ID Type and Content Examples ...............................................................................................14-6

14.8

Pre-Shared Key ........................................................................................................................14-7

14.9

Editing VPN Policies ...............................................................................................................14-7

14.10

IKE Phases .............................................................................................................................14-13

14.10.1

Negotiation Mode...........................................................................................................14-14

14.10.2

Diffie-Hellman (DH) Key Groups .................................................................................14-14

14.10.3

Perfect Forward Secrecy (PFS) ......................................................................................14-15

14.11

Configuring Advanced IKE Settings......................................................................................14-15

14.12

Manual Key Setup..................................................................................................................14-19

14.12.1

Security Parameter Index (SPI)......................................................................................14-19

14.13

Configuring Manual Key .......................................................................................................14-20

14.14

Viewing SA Monitor..............................................................................................................14-24

14.15

Configuring Global Setting ....................................................................................................14-26

14.16

Configuring IPSec Logs.........................................................................................................14-27

14.17

Telecommuter VPN/IPSec Examples ....................................................................................14-31

14.17.1

Telecommuters Sharing One VPN Rule Example .........................................................14-31

14.17.2

Telecommuters Using Unique VPN Rules Example......................................................14-32

14.18

VPN and Remote Management..............................................................................................14-33

Chapter 15 Remote Management Configuration ....................................................................................15-1

15.1

Remote Management Overview...............................................................................................15-1

15.1.1

Remote Management Limitations ............................................................................................15-1

15.1.2

Remote Management and NAT................................................................................................15-1

15.1.3

System Timeout .......................................................................................................................15-2

Advertising