Prestige 662H/HW Series User’s Guide

19.7

NAT Traversal ................................................................................................

222

19.7.1 NAT Traversal Configuration .................................................................

223

19.7.2 Remote DNS Server .............................................................................

223

19.8

ID Type and Content ......................................................................................

224

19.8.1 ID Type and Content Examples ............................................................

225

19.9

Pre-Shared Key ..............................................................................................

226

19.10 Editing VPN Policies ....................................................................................

226

19.11 IKE Phases ..................................................................................................

231

19.11.1 Negotiation Mode ................................................................................

232

19.11.2 Diffie-Hellman (DH) Key Groups .........................................................

233

19.11.3 Perfect Forward Secrecy (PFS) .........................................................

233

19.12 Configuring Advanced IKE Settings .............................................................

233

19.13 Manual Key Setup ........................................................................................

236

19.13.1 Security Parameter Index (SPI) .........................................................

236

19.14 Configuring Manual Key ...............................................................................

237

19.15 Viewing SA Monitor ......................................................................................

240

19.16 Configuring Global Setting ...........................................................................

241

19.17 Telecommuter VPN/IPSec Examples ...........................................................

242

19.17.1 Telecommuters Sharing One VPN Rule Example ..............................

242

19.17.2 Telecommuters Using Unique VPN Rules Example ...........................

243

19.18 VPN and Remote Management ...................................................................

245

Chapter 20

 

 

Remote Management Configuration ..................................................................

246

20.1

Remote Management Overview .....................................................................

246

20.1.1 Remote Management Limitations .........................................................

246

20.1.2 Remote Management and NAT ............................................................

247

20.1.3 System Timeout ...................................................................................

247

20.2

Telnet ..............................................................................................................

247

20.3

FTP ................................................................................................................

247

20.4 Web ................................................................................................................

248

20.5

Configuring Remote Management .................................................................

248

Chapter 21

 

 

Universal Plug-and-Play (UPnP) .........................................................................

250

21.1

Introducing Universal Plug and Play ..............................................................

250

21.1.1 How do I know if I'm using UPnP? ........................................................

250

21.1.2 NAT Traversal .......................................................................................

250

21.1.3 Cautions with UPnP ..............................................................................

250

21.2 UPnP and ZyXEL ...........................................................................................

251

21.2.1 Configuring UPnP .................................................................................

251

21.3

Installing UPnP in Windows Example ............................................................

252

21.4

Using UPnP in Windows XP Example ...........................................................

256

15