Reference Manual for th e Pr oSafe VPN F irewall 25 with 4 Gigabi t LAN a nd Dual WAN Por ts
-7
202-10085-01, March 2005
MacOS X ............... ... .... ................... ... .... ................... ... ... .................... ... ... ............ C-16
Verifying TCP/IP Properties for Macintosh Computers .................... ... ... ... ............ C-17
Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20
Restarting the Network ................................................................................................ C-21
Appendix D
Virtual Private Networking
What is a VPN? ............................................................................................................. D-1
What Is IPSec and How Does It Work? ......................................................................... D-2
IPSec Security Features ........................... ... ... ... .... ... ... ... .... ... ... ................... .... ... ... . D-2
IPSec Components ...... ................... ... .................... ... ... .................... ... ................... . D-2
Encapsulating Security Payload (ESP) ................................................................... D-3
Authentication Header (AH) ............ ... .... ... ... ... ... .... ... ... ... .................... ... ... ... .... ... ... . D-4
IKE Security Association .................... .................... ... ... ... .... ................... ... ... .... ... .... D -4
Mode ............... ....................... ................... ....................... ...................... ........... D-5
Key Management .................................................................................................... D-6
Understand the Process Before You Begin .. ................................................................. D-6
VPN Process Overview ......... ... ... .... ... ... ... .... ... ... ... .................... ... ... ................... .... ... .... D -7
Network Interfaces and Addresses ......................................................................... D-7
Interface Addressing ......................................................................................... D-7
Firewalls ........................................................................................................... D-8
Setting Up a VPN Tunnel Between Gateways ........................................................ D-8
VPNC IKE Security Parameters ......... ... ... .... ... ............................................................ D-10
VPNC IKE Phase I Parameters ............................................................................. D-10
VPNC IKE Phase II Parameters ............................................................................ D-11
Testing and Troubleshooting ........................................................................................ D-11
Additional Reading ................... ... .... ... ... ... .................... ... ... ... .... ................... ... ... .... ... .. D-11
Glossary
List of Glossary Terms ........................................................................................Glossary-1
Numeric ..............................................................................................................Glossary-1
A .........................................................................................................................Glossary-2
B .........................................................................................................................Glossary-2