beautypg.com

ZyXEL Communications Prestige 2602H Series User Manual

Page 18

background image

Prestige 2602H/HW Series User’s Guide

18

Table of Contents

16.1.4 VPN Applications ..................................................................................208

16.2 IPSec Architecture .........................................................................................209

16.2.1 IPSec Algorithms ..................................................................................209
16.2.2 Key Management ..................................................................................209

16.3 Encapsulation .................................................................................................209

16.3.1 Transport Mode ....................................................................................210
16.3.2 Tunnel Mode ........................................................................................210

16.4 IPSec and NAT ...............................................................................................210

Chapter 17
VPN Screens.........................................................................................................
213

17.1 VPN/IPSec Overview .....................................................................................213
17.2 IPSec Algorithms ............................................................................................213

17.2.1 AH (Authentication Header) Protocol ...................................................213
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................214

17.3 My IP Address ................................................................................................214
17.4 Secure Gateway Address ..............................................................................215

17.4.1 Dynamic Secure Gateway Address ......................................................215

17.5 VPN Summary Screen ...................................................................................215
17.6 Keep Alive ......................................................................................................217
17.7 Remote DNS Server ......................................................................................217
17.8 NAT Traversal ................................................................................................218

17.8.1 NAT Traversal Configuration .................................................................219

17.9 ID Type and Content ......................................................................................219

17.9.1 ID Type and Content Examples ............................................................220

17.10 Pre-Shared Key ............................................................................................221
17.11 Editing VPN Policies .....................................................................................221
17.12 IKE Phases .................................................................................................226

17.12.1 Negotiation Mode ................................................................................228
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................228
17.12.3 Perfect Forward Secrecy (PFS) .........................................................228

17.13 Configuring Advanced IKE Settings .............................................................228
17.14 Manual Key Setup ........................................................................................231

17.14.1 Security Parameter Index (SPI) .........................................................231

17.15 Configuring Manual Key ...............................................................................232
17.16 Viewing SA Monitor ......................................................................................235
17.17 Configuring Global Setting ...........................................................................237
17.18 Telecommuter VPN/IPSec Examples ...........................................................237

17.18.1 Telecommuters Sharing One VPN Rule Example ..............................237
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................238

17.19 VPN and Remote Management ...................................................................240