Table of Contents
14.4.3 Encryption and Authentication Algorithms ..............................................................
311
14.5
VPN Rules (IKE) Gateway Policy Edit .............................................................................
312
14.6
IPSec SA Overview .....................................................................................................
318
14.6.1 Local and Remote Networks ..................................................................................
14.6.2 Virtual Address Mapping ........................................................................................
319
14.6.3 Active Protocol .......................................................................................................
320
14.6.4 Encapsulation .........................................................................................................
14.6.5 IPSec SA Proposal and Perfect Forward Secrecy .................................................
321
14.7
VPN Rules (IKE) Network Policy Edit .............................................................................
14.8
Network Policy Port Forwarding ...................................................................................
326
14.9
Network Policy Move .....................................................................................................
328
14.10 Dialing the VPN Tunnel via Web Configurator ...............................................................
329
14.11 VPN Troubleshooting .....................................................................................................
330
14.11.1 VPN Log ...............................................................................................................
14.12 IPSec Debug .................................................................................................................
331
14.13 IPSec SA Using Manual Keys ...................................................................................
333
14.13.1 IPSec SA Proposal Using Manual Keys ...............................................................
14.13.2 Authentication and the Security Parameter Index (SPI) .......................................
14.14 VPN Rules (Manual) ......................................................................................................
14.15 VPN Rules (Manual) Edit ............................................................................................
335
14.16 VPN SA Monitor ..........................................................................................................
338
14.17 VPN Global Setting .......................................................................................................
14.17.1 Local and Remote IP Address Conflict Resolution ..............................................
14.18 Telecommuter VPN/IPSec Examples ............................................................................
341
14.18.1 Telecommuters Sharing One VPN Rule Example ................................................
342
14.18.2 Telecommuters Using Unique VPN Rules Example .............................................
14.19 VPN and Remote Management .....................................................................................
344
14.20 Hub-and-spoke VPN ......................................................................................................
14.20.1 Hub-and-spoke VPN Example .............................................................................
345
14.20.2 Hub-and-spoke Example VPN Rule Addresses ...................................................
346
14.20.3 Hub-and-spoke VPN Requirements and Suggestions .........................................
Chapter 15
Certificates ............................................................................................................................
349
15.1
Certificates Overview .......................................................................................................
15.1.1 Advantages of Certificates .....................................................................................
350
15.2
Self-signed Certificates ....................................................................................................
15.3
Verifying a Certificate .......................................................................................................
15.3.1 Checking the Fingerprint of a Certificate on Your Computer ..................................
15.4
Configuration Summary ...................................................................................................
351
15.5
My Certificates ................................................................................................................
352
15.6
My Certificate Details .....................................................................................................
354
15.7
My Certificate Export ......................................................................................................
356
ZyWALL 2WG User’s Guide
17