ZyXEL Communications P-334 User Manual

Page 14

Advertising
background image

Prestige 334 User’s Guide

13

Table of Contents

14.1.3.1 Encryption ...................................................................................150
14.1.3.2 Data Confidentiality .....................................................................151
14.1.3.3 Data Integrity ...............................................................................151
14.1.3.4 Data Origin Authentication ..........................................................151

14.1.4 VPN Applications ..................................................................................151

14.2 IPSec Architecture .........................................................................................151

14.2.1 IPSec Algorithms ..................................................................................152
14.2.2 Key Management ..................................................................................152

14.3 Encapsulation .................................................................................................152

14.3.1 Transport Mode ....................................................................................153
14.3.2 Tunnel Mode .........................................................................................153

14.4 IPSec and NAT ...............................................................................................153

Chapter 15
VPN Screens.......................................................................................................
156

15.1 VPN/IPSec Overview .....................................................................................156
15.2 IPSec Algorithms ............................................................................................156

15.2.1 AH (Authentication Header) Protocol ....................................................156
15.2.2 ESP (Encapsulating Security Payload) Protocol ..................................156

15.3 My IP Address ................................................................................................157
15.4 Secure Gateway Address ..............................................................................157

15.4.1 Dynamic Secure Gateway Address ......................................................158

15.5 Summary Screen ...........................................................................................158
15.6 Keep Alive ......................................................................................................160
15.7 NAT Traversal ................................................................................................160

15.7.1 NAT Traversal Configuration .................................................................160
15.7.2 Remote DNS Server .............................................................................161

15.8 ID Type and Content ......................................................................................162

15.8.1 ID Type and Content Examples ............................................................163

15.9 Pre-Shared Key ..............................................................................................163
15.10 Editing VPN Rules ........................................................................................164
15.11 IKE Phases ..................................................................................................167

15.11.1 Negotiation Mode ................................................................................168
15.11.2 Diffie-Hellman (DH) Key Groups .........................................................168
15.11.3 Perfect Forward Secrecy (PFS) ..........................................................168

15.12 Configuring Advanced IKE Settings .............................................................169
15.13 Manual Key Setup ........................................................................................174

15.13.1 Security Parameter Index (SPI) ..........................................................175

15.14 Configuring Manual Key ...............................................................................175
15.15 Viewing SA Monitor ......................................................................................178
15.16 Configuring Global Setting ...........................................................................179
15.17 Telecommuter VPN/IPSec Examples ...........................................................180

15.17.1 Telecommuters Sharing One VPN Rule Example ..............................180

Advertising