Prestige 2602HW Series User’s Guide
Chapter 17
VPN Screens.........................................................................................................
201
17.1
VPN/IPSec Overview .....................................................................................
17.2
IPSec Algorithms ............................................................................................
17.2.1 AH (Authentication Header) Protocol ...................................................
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................
202
17.3
My IP Address ................................................................................................
17.4
Secure Gateway Address ..............................................................................
203
17.4.1 Dynamic Secure Gateway Address ......................................................
17.5 VPN Summary Screen ...................................................................................
17.6
Keep Alive ......................................................................................................
205
17.7
Remote DNS Server ......................................................................................
17.8
NAT Traversal ................................................................................................
206
17.8.1 NAT Traversal Configuration .................................................................
207
17.9
ID Type and Content ......................................................................................
17.9.1 ID Type and Content Examples ............................................................
208
17.10 Pre-Shared Key ............................................................................................
209
17.11 Editing VPN Policies .....................................................................................
17.12 IKE Phases .................................................................................................
214
17.12.1 Negotiation Mode ................................................................................
216
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................
17.12.3 Perfect Forward Secrecy (PFS) .........................................................
17.13 Configuring Advanced IKE Settings .............................................................
17.14 Manual Key Setup ........................................................................................
219
17.14.1 Security Parameter Index (SPI) .........................................................
17.15 Configuring Manual Key ...............................................................................
220
17.16 Viewing SA Monitor ......................................................................................
223
17.17 Configuring Global Setting ...........................................................................
225
17.18 Telecommuter VPN/IPSec Examples ...........................................................
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................
226
17.19 VPN and Remote Management ...................................................................
228
Chapter 18
229
18.1
Remote Management Overview .....................................................................
18.1.1 Remote Management Limitations .........................................................
18.1.2 Remote Management and NAT ............................................................
230
18.1.3 System Timeout ...................................................................................
18.2
Telnet ..............................................................................................................
18.3
FTP ................................................................................................................
18.4 Web ................................................................................................................
231
18.5
Configuring Remote Management .................................................................
16
Table of Contents