Prestige 2602HW Series User’s Guide

Chapter 17

 

 

VPN Screens.........................................................................................................

201

17.1

VPN/IPSec Overview .....................................................................................

201

17.2

IPSec Algorithms ............................................................................................

201

17.2.1 AH (Authentication Header) Protocol ...................................................

201

17.2.2 ESP (Encapsulating Security Payload) Protocol .................................

202

17.3

My IP Address ................................................................................................

202

17.4

Secure Gateway Address ..............................................................................

203

17.4.1 Dynamic Secure Gateway Address ......................................................

203

17.5 VPN Summary Screen ...................................................................................

203

17.6

Keep Alive ......................................................................................................

205

17.7

Remote DNS Server ......................................................................................

205

17.8

NAT Traversal ................................................................................................

206

17.8.1 NAT Traversal Configuration .................................................................

207

17.9

ID Type and Content ......................................................................................

207

17.9.1 ID Type and Content Examples ............................................................

208

17.10 Pre-Shared Key ............................................................................................

209

17.11 Editing VPN Policies .....................................................................................

209

17.12 IKE Phases .................................................................................................

214

17.12.1 Negotiation Mode ................................................................................

216

17.12.2 Diffie-Hellman (DH) Key Groups .........................................................

216

17.12.3 Perfect Forward Secrecy (PFS) .........................................................

216

17.13 Configuring Advanced IKE Settings .............................................................

216

17.14 Manual Key Setup ........................................................................................

219

17.14.1 Security Parameter Index (SPI) .........................................................

219

17.15 Configuring Manual Key ...............................................................................

220

17.16 Viewing SA Monitor ......................................................................................

223

17.17 Configuring Global Setting ...........................................................................

225

17.18 Telecommuter VPN/IPSec Examples ...........................................................

225

17.18.1 Telecommuters Sharing One VPN Rule Example ..............................

225

17.18.2 Telecommuters Using Unique VPN Rules Example ...........................

226

17.19 VPN and Remote Management ...................................................................

228

Chapter 18

 

 

Remote Management Configuration ..................................................................

229

18.1

Remote Management Overview .....................................................................

229

18.1.1 Remote Management Limitations .........................................................

229

18.1.2 Remote Management and NAT ............................................................

230

18.1.3 System Timeout ...................................................................................

230

18.2

Telnet ..............................................................................................................

230

18.3

FTP ................................................................................................................

230

18.4 Web ................................................................................................................

231

18.5

Configuring Remote Management .................................................................

231

16

Table of Contents