Prestige 2602H/HW Series User’s Guide

16.1.4 VPN Applications ..................................................................................

208

16.2

IPSec Architecture .........................................................................................

209

16.2.1 IPSec Algorithms ..................................................................................

209

16.2.2 Key Management ..................................................................................

209

16.3

Encapsulation .................................................................................................

209

16.3.1 Transport Mode ....................................................................................

210

16.3.2 Tunnel Mode ........................................................................................

210

16.4

IPSec and NAT ...............................................................................................

210

Chapter 17

 

 

VPN Screens.........................................................................................................

213

17.1

VPN/IPSec Overview .....................................................................................

213

17.2

IPSec Algorithms ............................................................................................

213

17.2.1 AH (Authentication Header) Protocol ...................................................

213

17.2.2 ESP (Encapsulating Security Payload) Protocol .................................

214

17.3

My IP Address ................................................................................................

214

17.4

Secure Gateway Address ..............................................................................

215

17.4.1 Dynamic Secure Gateway Address ......................................................

215

17.5 VPN Summary Screen ...................................................................................

215

17.6

Keep Alive ......................................................................................................

217

17.7

Remote DNS Server ......................................................................................

217

17.8

NAT Traversal ................................................................................................

218

17.8.1 NAT Traversal Configuration .................................................................

219

17.9

ID Type and Content ......................................................................................

219

17.9.1 ID Type and Content Examples ............................................................

220

17.10 Pre-Shared Key ............................................................................................

221

17.11 Editing VPN Policies .....................................................................................

221

17.12 IKE Phases .................................................................................................

226

17.12.1 Negotiation Mode ................................................................................

228

17.12.2 Diffie-Hellman (DH) Key Groups .........................................................

228

17.12.3 Perfect Forward Secrecy (PFS) .........................................................

228

17.13 Configuring Advanced IKE Settings .............................................................

228

17.14 Manual Key Setup ........................................................................................

231

17.14.1 Security Parameter Index (SPI) .........................................................

231

17.15 Configuring Manual Key ...............................................................................

232

17.16 Viewing SA Monitor ......................................................................................

235

17.17 Configuring Global Setting ...........................................................................

237

17.18 Telecommuter VPN/IPSec Examples ...........................................................

237

17.18.1 Telecommuters Sharing One VPN Rule Example ..............................

237

17.18.2 Telecommuters Using Unique VPN Rules Example ...........................

238

17.19 VPN and Remote Management ...................................................................

240

18

Table of Contents