beautypg.com

ZyXEL Communications P-335WT User Manual

Page 15

background image

P-335 Series User’s Guide

Table of Contents

15

15.1.2 Remote Management and NAT ............................................................198
15.1.3 System Timeout ...................................................................................198

15.2 Configuring WWW ..........................................................................................198
15.3 Configuring Telnet ..........................................................................................199
15.4 Configuring TELNET ......................................................................................200
15.5 Configuring FTP .............................................................................................201
15.6 SNMP .............................................................................................................202

15.6.1 Supported MIBs ....................................................................................203
15.6.2 SNMP Traps .........................................................................................203
15.6.3 Configuring SNMP ................................................................................203

15.7 Configuring DNS ............................................................................................205
15.8 Configuring Security .......................................................................................206

Chapter 16
Introduction to IPSec ...........................................................................................
209

16.1 VPN Overview ................................................................................................209

16.1.1 IPSec ....................................................................................................209
16.1.2 Security Association .............................................................................209
16.1.3 Other Terminology ................................................................................209

16.1.3.1 Encryption ...................................................................................209
16.1.3.2 Data Confidentiality .....................................................................210
16.1.3.3 Data Integrity ...............................................................................210
16.1.3.4 Data Origin Authentication ..........................................................210

16.1.4 VPN Applications ..................................................................................210

16.2 IPSec Architecture .........................................................................................210

16.2.1 IPSec Algorithms ..................................................................................211
16.2.2 Key Management ..................................................................................211

16.3 Encapsulation .................................................................................................211

16.3.1 Transport Mode ....................................................................................212
16.3.2 Tunnel Mode .........................................................................................212

16.4 IPSec and NAT ...............................................................................................212

Chapter 17
VPN Screens.......................................................................................................
215

17.1 VPN/IPSec Overview .....................................................................................215
17.2 IPSec Algorithms ............................................................................................215

17.2.1 AH (Authentication Header) Protocol ....................................................215
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................215

17.3 My IP Address ................................................................................................216
17.4 Secure Gateway Address ..............................................................................216

17.4.1 Dynamic Secure Gateway Address ......................................................217

17.5 Summary Screen ...........................................................................................217
17.6 Keep Alive ......................................................................................................219