Prestige 2602H/HW Series User’s Guide
16.1.4 VPN Applications ..................................................................................
208
16.2
IPSec Architecture .........................................................................................
209
16.2.1 IPSec Algorithms ..................................................................................
16.2.2 Key Management ..................................................................................
16.3
Encapsulation .................................................................................................
16.3.1 Transport Mode ....................................................................................
210
16.3.2 Tunnel Mode ........................................................................................
16.4
IPSec and NAT ...............................................................................................
Chapter 17
VPN Screens.........................................................................................................
213
17.1
VPN/IPSec Overview .....................................................................................
17.2
IPSec Algorithms ............................................................................................
17.2.1 AH (Authentication Header) Protocol ...................................................
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................
214
17.3
My IP Address ................................................................................................
17.4
Secure Gateway Address ..............................................................................
215
17.4.1 Dynamic Secure Gateway Address ......................................................
17.5 VPN Summary Screen ...................................................................................
17.6
Keep Alive ......................................................................................................
217
17.7
Remote DNS Server ......................................................................................
17.8
NAT Traversal ................................................................................................
218
17.8.1 NAT Traversal Configuration .................................................................
219
17.9
ID Type and Content ......................................................................................
17.9.1 ID Type and Content Examples ............................................................
220
17.10 Pre-Shared Key ............................................................................................
221
17.11 Editing VPN Policies .....................................................................................
17.12 IKE Phases .................................................................................................
226
17.12.1 Negotiation Mode ................................................................................
228
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................
17.12.3 Perfect Forward Secrecy (PFS) .........................................................
17.13 Configuring Advanced IKE Settings .............................................................
17.14 Manual Key Setup ........................................................................................
231
17.14.1 Security Parameter Index (SPI) .........................................................
17.15 Configuring Manual Key ...............................................................................
232
17.16 Viewing SA Monitor ......................................................................................
235
17.17 Configuring Global Setting ...........................................................................
237
17.18 Telecommuter VPN/IPSec Examples ...........................................................
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................
238
17.19 VPN and Remote Management ...................................................................
240
18
Table of Contents