ZyXEL Communications 792H User Manual
Page 17

Prestige 792H G.SHDSL Router
Table of Contents
xi
13.2
IPSec Architecture ...................................................................................................................13-3
13.2.1
IPSec Algorithms .....................................................................................................................13-4
13.2.2
Key Management .....................................................................................................................13-4
13.3
Encapsulation ...........................................................................................................................13-5
13.3.1
Transport Mode........................................................................................................................13-5
13.3.2
Tunnel Mode ............................................................................................................................13-5
13.4
IPSec and NAT ........................................................................................................................13-5
Chapter 14 VPN Screens ...........................................................................................................................14-1
14.1
VPN/IPSec Overview...............................................................................................................14-1
14.2
IPSec Algorithms .....................................................................................................................14-1
14.2.1
AH (Authentication Header) Protocol......................................................................................14-1
14.2.2
ESP (Encapsulating Security Payload) Protocol ......................................................................14-1
14.3
My IP Address..........................................................................................................................14-2
14.4
Secure Gateway Address..........................................................................................................14-2
14.4.1
Dynamic Secure Gateway Address ..........................................................................................14-2
14.5
VPN Summary Screen .............................................................................................................14-3
14.6
Keep Alive ...............................................................................................................................14-5
14.7
ID Type and Content................................................................................................................14-5
14.7.1
ID Type and Content Examples ...............................................................................................14-6
14.8
Pre-Shared Key ........................................................................................................................14-7
14.9
Editing VPN Policies ...............................................................................................................14-7
14.10
IKE Phases .............................................................................................................................14-13
14.10.1
Negotiation Mode...........................................................................................................14-14
14.10.2
Diffie-Hellman (DH) Key Groups .................................................................................14-14
14.10.3
Perfect Forward Secrecy (PFS) ......................................................................................14-15
14.11
Configuring Advanced IKE Settings......................................................................................14-15
14.12
Manual Key Setup..................................................................................................................14-19
14.12.1
Security Parameter Index (SPI)......................................................................................14-19
14.13
Configuring Manual Key .......................................................................................................14-20
14.14
Viewing SA Monitor..............................................................................................................14-24
14.15
Configuring Global Setting ....................................................................................................14-26
14.16
Configuring IPSec Logs.........................................................................................................14-27
14.17
Telecommuter VPN/IPSec Examples ....................................................................................14-31
14.17.1
Telecommuters Sharing One VPN Rule Example .........................................................14-31
14.17.2
Telecommuters Using Unique VPN Rules Example......................................................14-32
14.18
VPN and Remote Management..............................................................................................14-33
Chapter 15 Remote Management Configuration ....................................................................................15-1
15.1
Remote Management Overview...............................................................................................15-1
15.1.1
Remote Management Limitations ............................................................................................15-1
15.1.2
Remote Management and NAT................................................................................................15-1
15.1.3
System Timeout .......................................................................................................................15-2