beautypg.com

ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Page 16

background image

Prestige 2602HW Series User’s Guide

16

Table of Contents

Chapter 17
VPN Screens.........................................................................................................
201

17.1 VPN/IPSec Overview .....................................................................................201
17.2 IPSec Algorithms ............................................................................................201

17.2.1 AH (Authentication Header) Protocol ...................................................201
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................202

17.3 My IP Address ................................................................................................202
17.4 Secure Gateway Address ..............................................................................203

17.4.1 Dynamic Secure Gateway Address ......................................................203

17.5 VPN Summary Screen ...................................................................................203
17.6 Keep Alive ......................................................................................................205
17.7 Remote DNS Server ......................................................................................205
17.8 NAT Traversal ................................................................................................206

17.8.1 NAT Traversal Configuration .................................................................207

17.9 ID Type and Content ......................................................................................207

17.9.1 ID Type and Content Examples ............................................................208

17.10 Pre-Shared Key ............................................................................................209
17.11 Editing VPN Policies .....................................................................................209
17.12 IKE Phases .................................................................................................214

17.12.1 Negotiation Mode ................................................................................216
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................216
17.12.3 Perfect Forward Secrecy (PFS) .........................................................216

17.13 Configuring Advanced IKE Settings .............................................................216
17.14 Manual Key Setup ........................................................................................219

17.14.1 Security Parameter Index (SPI) .........................................................219

17.15 Configuring Manual Key ...............................................................................220
17.16 Viewing SA Monitor ......................................................................................223
17.17 Configuring Global Setting ...........................................................................225
17.18 Telecommuter VPN/IPSec Examples ...........................................................225

17.18.1 Telecommuters Sharing One VPN Rule Example ..............................225
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................226

17.19 VPN and Remote Management ...................................................................228

Chapter 18
Remote Management Configuration ..................................................................
229

18.1 Remote Management Overview .....................................................................229

18.1.1 Remote Management Limitations .........................................................229
18.1.2 Remote Management and NAT ............................................................230
18.1.3 System Timeout ...................................................................................230

18.2 Telnet ..............................................................................................................230
18.3 FTP ................................................................................................................230
18.4 Web ................................................................................................................231
18.5 Configuring Remote Management .................................................................231