beautypg.com

ZyXEL Communications 5 Series User Manual

Page 18

background image

ZyWALL 5/35/70 Series User’s Guide

18

Table of Contents

Chapter 17
Content Filtering Reports ....................................................................................
315

17.1 Checking Content Filtering Activation ............................................................315

17.2 Viewing Content Filtering Reports ..................................................................315

17.3 Web Site Submission .....................................................................................320

Chapter 18
IPSec VPN .............................................................................................................
323

18.1 IPSec VPN Overview ...................................................................................323

18.1.1 IKE SA Overview ..................................................................................324

18.1.1.1 IP Addresses of the ZyWALL and Remote IPSec Router ...........324

18.2 VPN Rules (IKE) ............................................................................................325

18.3 IKE SA Setup ................................................................................................327

18.3.1 IKE SA Proposal ...................................................................................327

18.3.1.1 Diffie-Hellman (DH) Key Exchange .............................................328

18.3.1.2 Authentication .............................................................................328

18.3.1.3 Extended Authentication .............................................................330

18.3.1.4 Negotiation Mode ........................................................................330

18.3.1.5 VPN, NAT, and NAT Traversal .....................................................331

18.4 Additional IPSec VPN Topics .........................................................................332

18.4.1 SA Life Time .........................................................................................332

18.4.2 IPSec High Availability ..........................................................................332

18.4.3 Encryption and Authentication Algorithms ............................................333

18.5 VPN Rules (IKE) Gateway Policy Edit ...........................................................334

18.6 IPSec SA Overview ....................................................................................340

18.6.0.1 Local Network and Remote Network ...........................................340

18.6.0.2 Active Protocol ............................................................................340

18.6.0.3 Encapsulation ..............................................................................341

18.6.0.4 IPSec SA Proposal and Perfect Forward Secrecy ......................341

18.7 VPN Rules (IKE): Network Policy Edit ..........................................................342

18.8 VPN Rules (IKE): Network Policy Move .......................................................346

18.9 IPSec SA Using Manual Keys ....................................................................348

18.9.1 IPSec SA Proposal Using Manual Keys ...............................................348

18.9.2 Authentication and the Security Parameter Index (SPI) .......................348

18.10 VPN Rules (Manual) ....................................................................................348

18.11 VPN Rules (Manual): Edit .........................................................................350

18.12 VPN SA Monitor .........................................................................................353

18.13 VPN Global Setting .....................................................................................354

18.14 Telecommuter VPN/IPSec Examples ...........................................................355

18.14.1 Telecommuters Sharing One VPN Rule Example ..............................355

18.14.2 Telecommuters Using Unique VPN Rules Example ...........................356

18.15 VPN and Remote Management ...................................................................358

18.16 Hub-and-spoke VPN ....................................................................................358