ZyXEL Communications ZyXEL ZyWALL 35 User Manual

Page 15

Advertising
background image

ZyWALL 35 User’s Guide

13

14.5 Summary Screen ...........................................................................................241
14.6 Keep Alive ......................................................................................................243
14.7 NAT Traversal ................................................................................................243

14.7.1 NAT Traversal Configuration .................................................................244
14.7.2 X-Auth (Extended Authentication) ........................................................244
14.7.3 Remote DNS Server .............................................................................244

14.8 ID Type and Content ......................................................................................245

14.8.1 ID Type and Content Examples ............................................................246

14.9 Pre-Shared Key ..............................................................................................247
14.10 Editing VPN Policies ....................................................................................247
14.11 IKE Phases ...................................................................................................254

14.11.1 X-Auth and IKE ...................................................................................255
14.11.2 Negotiation Mode ................................................................................255
14.11.3 Diffie-Hellman (DH) Key Groups .........................................................255
14.11.4 Perfect Forward Secrecy (PFS) ..........................................................256

14.12 Configuring Advanced VPN Rule .................................................................256
14.13 Manual Key Setup ........................................................................................258

14.13.1 Security Parameter Index (SPI) ..........................................................258

14.14 Configuring Manual Key ...............................................................................259
14.15 Viewing SA Monitor ......................................................................................262
14.16 Configuring Global Setting ...........................................................................263
14.17 Telecommuter VPN/IPSec Examples ...........................................................264

14.17.1 Telecommuters Sharing One VPN Rule Example ..............................264
14.17.2 Telecommuters Using Unique VPN Rules Example ...........................264

14.18 VPN and Remote Management ...................................................................266

Chapter 15
Certificates............................................................................................................
267

15.1 Certificates Overview .....................................................................................267

15.1.1 Advantages of Certificates ....................................................................268

15.2 Self-signed Certificates ..................................................................................268
15.3 Configuration Summary .................................................................................268
15.4 My Certificates ...............................................................................................268
15.5 Certificate File Formats ..................................................................................270
15.6 Importing a Certificate ....................................................................................271
15.7 Creating a Certificate .....................................................................................272
15.8 My Certificate Details .....................................................................................274
15.9 Trusted CAs ...................................................................................................277
15.10 Importing a Trusted CA’s Certificate .............................................................279
15.11 Trusted CA Certificate Details ......................................................................280
15.12 Trusted Remote Hosts .................................................................................283
15.13 Verifying a Trusted Remote Host’s Certificate ..............................................285

15.13.1 Trusted Remote Host Certificate Fingerprints .....................................285

Advertising