ZyXEL Communications P-2802H(W)(L)-I Series User Manual

Page 16

Advertising
background image

Table of Contents

P-2802H(W)(L)-I Series User’s Guide

16

13.4 IPSec and NAT ................................................................................................................ 182

Chapter 14
VPN Screens.......................................................................................................................... 185

14.1 VPN/IPSec Overview ....................................................................................................... 185
14.2 IPSec Algorithms ............................................................................................................. 185

14.2.1 AH (Authentication Header) Protocol ..................................................................... 185
14.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 185

14.3 My IP Address ................................................................................................................. 186
14.4 Secure Gateway Address ................................................................................................ 186

14.4.1 Dynamic Secure Gateway Address ....................................................................... 187

14.5 VPN Setup Screen ......................................................................................................... 187
14.6 Keep Alive ....................................................................................................................... 189
14.7 VPN, NAT, and NAT Traversal ......................................................................................... 189
14.8 Remote DNS Server ........................................................................................................ 190
14.9 ID Type and Content ........................................................................................................ 191

14.9.1 ID Type and Content Examples ............................................................................. 192

14.10 Pre-Shared Key ............................................................................................................. 193
14.11 Editing VPN Policies ..................................................................................................... 193
14.12 IKE Phases ................................................................................................................... 198

14.12.1 Negotiation Mode ................................................................................................. 199
14.12.2 Diffie-Hellman (DH) Key Groups .......................................................................... 199
14.12.3 Perfect Forward Secrecy (PFS) .......................................................................... 200

14.13 Configuring Advanced IKE Settings ............................................................................. 200
14.14 Manual Key Setup ......................................................................................................... 202

14.14.1 Security Parameter Index (SPI) .......................................................................... 202

14.15 Configuring Manual Key ............................................................................................... 203
14.16 Viewing SA Monitor ...................................................................................................... 205
14.17 Configuring Global Setting ............................................................................................ 207
14.18 Telecommuter VPN/IPSec Examples ............................................................................ 207

14.18.1 Telecommuters Sharing One VPN Rule Example ................................................ 207
14.18.2 Telecommuters Using Unique VPN Rules Example ............................................. 208

14.19 VPN and Remote Management ..................................................................................... 210

Chapter 15
Certificates ............................................................................................................................ 211

15.1 Certificates Overview .......................................................................................................211

15.1.1 Advantages of Certificates ..................................................................................... 212

15.2 Self-signed Certificates .................................................................................................... 212
15.3 Configuration Summary ................................................................................................... 212
15.4 My Certificates ................................................................................................................. 212
15.5 My Certificate Import ...................................................................................................... 214

15.5.1 Certificate File Formats .......................................................................................... 215

Advertising