ZyXEL Communications Prestige 2602H Series User Manual
Page 18

Prestige 2602H/HW Series User’s Guide
18
Table of Contents
17.2.1 AH (Authentication Header) Protocol ...................................................213
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................214
17.3 My IP Address ................................................................................................214
17.4 Secure Gateway Address ..............................................................................215
17.4.1 Dynamic Secure Gateway Address ......................................................215
17.5 VPN Summary Screen ...................................................................................215
17.6 Keep Alive ......................................................................................................217
17.7 Remote DNS Server ......................................................................................217
17.8 NAT Traversal ................................................................................................218
17.9.1 ID Type and Content Examples ............................................................220
17.10 Pre-Shared Key ............................................................................................221
17.11 Editing VPN Policies .....................................................................................221
17.12 IKE Phases .................................................................................................226
17.13 Configuring Advanced IKE Settings .............................................................228
17.14 Manual Key Setup ........................................................................................231
17.14.1 Security Parameter Index (SPI) .........................................................231
17.15 Configuring Manual Key ...............................................................................232
17.16 Viewing SA Monitor ......................................................................................235
17.17 Configuring Global Setting ...........................................................................237
17.18 Telecommuter VPN/IPSec Examples ...........................................................237
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................237
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................238