Table of Contents

14.4.3 Encryption and Authentication Algorithms ..............................................................

311

14.5

VPN Rules (IKE) Gateway Policy Edit .............................................................................

312

14.6

IPSec SA Overview .....................................................................................................

318

14.6.1 Local and Remote Networks ..................................................................................

318

14.6.2 Virtual Address Mapping ........................................................................................

319

14.6.3 Active Protocol .......................................................................................................

320

14.6.4 Encapsulation .........................................................................................................

320

14.6.5 IPSec SA Proposal and Perfect Forward Secrecy .................................................

321

14.7

VPN Rules (IKE) Network Policy Edit .............................................................................

321

14.8

Network Policy Port Forwarding ...................................................................................

326

14.9

Network Policy Move .....................................................................................................

328

14.10 Dialing the VPN Tunnel via Web Configurator ...............................................................

329

14.11 VPN Troubleshooting .....................................................................................................

330

14.11.1 VPN Log ...............................................................................................................

330

14.12 IPSec Debug .................................................................................................................

331

14.13 IPSec SA Using Manual Keys ...................................................................................

333

14.13.1 IPSec SA Proposal Using Manual Keys ...............................................................

333

14.13.2 Authentication and the Security Parameter Index (SPI) .......................................

333

14.14 VPN Rules (Manual) ......................................................................................................

333

14.15 VPN Rules (Manual) Edit ............................................................................................

335

14.16 VPN SA Monitor ..........................................................................................................

338

14.17 VPN Global Setting .......................................................................................................

338

14.17.1 Local and Remote IP Address Conflict Resolution ..............................................

338

14.18 Telecommuter VPN/IPSec Examples ............................................................................

341

14.18.1 Telecommuters Sharing One VPN Rule Example ................................................

342

14.18.2 Telecommuters Using Unique VPN Rules Example .............................................

342

14.19 VPN and Remote Management .....................................................................................

344

14.20 Hub-and-spoke VPN ......................................................................................................

344

14.20.1 Hub-and-spoke VPN Example .............................................................................

345

14.20.2 Hub-and-spoke Example VPN Rule Addresses ...................................................

346

14.20.3 Hub-and-spoke VPN Requirements and Suggestions .........................................

346

Chapter 15

 

Certificates ............................................................................................................................

349

15.1

Certificates Overview .......................................................................................................

349

15.1.1 Advantages of Certificates .....................................................................................

350

15.2

Self-signed Certificates ....................................................................................................

350

15.3

Verifying a Certificate .......................................................................................................

350

15.3.1 Checking the Fingerprint of a Certificate on Your Computer ..................................

350

15.4

Configuration Summary ...................................................................................................

351

15.5

My Certificates ................................................................................................................

352

15.6

My Certificate Details .....................................................................................................

354

15.7

My Certificate Export ......................................................................................................

356

ZyWALL 2WG User’s Guide

17