
Table of Contents
P-2602HWUDL-D User’s Guide
18
17.3 Encapsulation .................................................................................................................. 267
17.3.1 Transport Mode ...................................................................................................... 268
17.3.2 Tunnel Mode ......................................................................................................... 268
17.4 IPSec and NAT ................................................................................................................ 268
Chapter 18
VPN Screens.......................................................................................................................... 271
18.1 VPN/IPSec Overview ....................................................................................................... 271
18.2 IPSec Algorithms ............................................................................................................. 271
18.2.1 AH (Authentication Header) Protocol ..................................................................... 271
18.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 271
18.3 My IP Address ................................................................................................................. 272
18.4 Secure Gateway Address ................................................................................................ 272
18.4.1 Dynamic Secure Gateway Address ....................................................................... 273
18.5 VPN Setup Screen .........................................................................................................273
18.6 Keep Alive ....................................................................................................................... 275
18.7 VPN, NAT, and NAT Traversal ......................................................................................... 275
18.8 Remote DNS Server ........................................................................................................ 276
18.9 ID Type and Content ........................................................................................................ 277
18.9.1 ID Type and Content Examples ............................................................................. 278
18.10 Pre-Shared Key ............................................................................................................. 279
18.11 Editing VPN Policies ..................................................................................................... 279
18.12 IKE Phases ................................................................................................................... 284
18.12.1 Negotiation Mode ................................................................................................. 285
18.12.2 Diffie-Hellman (DH) Key Groups .......................................................................... 285
18.12.3 Perfect Forward Secrecy (PFS) .......................................................................... 285
18.13 Configuring Advanced IKE Settings ............................................................................. 285
18.14 Manual Key Setup .........................................................................................................288
18.14.1 Security Parameter Index (SPI) .......................................................................... 288
18.15 Configuring Manual Key ............................................................................................... 288
18.16 Viewing SA Monitor ......................................................................................................291
18.17 Configuring VPN Global Setting ................................................................................... 293
18.18 Telecommuter VPN/IPSec Examples ............................................................................ 293
18.18.1 Telecommuters Sharing One VPN Rule Example ................................................ 293
18.18.2 Telecommuters Using Unique VPN Rules Example ............................................. 294
18.19 VPN and Remote Management ..................................................................................... 296
Chapter 19
Certificates ............................................................................................................................ 297
19.1 Certificates Overview ...................................................................................................... 297
19.1.1 Advantages of Certificates ..................................................................................... 298
19.2 Self-signed Certificates .................................................................................................... 298
19.3 Configuration Summary ................................................................................................... 298
Comentarios a estos manuales