ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual
Page 16
Prestige 2602HW Series User’s Guide
16
Table of Contents
17.2.1 AH (Authentication Header) Protocol ...................................................201
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................202
17.3 My IP Address ................................................................................................202
17.4 Secure Gateway Address ..............................................................................203
17.4.1 Dynamic Secure Gateway Address ......................................................203
17.5 VPN Summary Screen ...................................................................................203
17.6 Keep Alive ......................................................................................................205
17.7 Remote DNS Server ......................................................................................205
17.8 NAT Traversal ................................................................................................206
17.9.1 ID Type and Content Examples ............................................................208
17.10 Pre-Shared Key ............................................................................................209
17.11 Editing VPN Policies .....................................................................................209
17.12 IKE Phases .................................................................................................214
17.13 Configuring Advanced IKE Settings .............................................................216
17.14 Manual Key Setup ........................................................................................219
17.14.1 Security Parameter Index (SPI) .........................................................219
17.15 Configuring Manual Key ...............................................................................220
17.16 Viewing SA Monitor ......................................................................................223
17.17 Configuring Global Setting ...........................................................................225
17.18 Telecommuter VPN/IPSec Examples ...........................................................225
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................225
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................226
18.1.1 Remote Management Limitations .........................................................229
18.1.2 Remote Management and NAT ............................................................230
18.1.3 System Timeout ...................................................................................230
18.2 Telnet ..............................................................................................................230
18.3 FTP ................................................................................................................230
18.4 Web ................................................................................................................231
18.5 Configuring Remote Management .................................................................231