ZyWALL 5/35/70 Series User’s Guide

Chapter 19

 

 

VPN Screens.........................................................................................................

308

19.1

VPN/IPSec Overview .....................................................................................

308

19.2

IPSec Algorithms ............................................................................................

308

19.2.1 AH (Authentication Header) Protocol ....................................................

308

19.2.2 ESP (Encapsulating Security Payload) Protocol ..................................

308

19.3 My ZyWALL ....................................................................................................

309

19.4

Remote Gateway Address .............................................................................

309

19.4.1 Dynamic Remote Gateway Address .....................................................

310

19.5

Nailed Up .......................................................................................................

310

19.6

NAT Traversal ................................................................................................

310

19.6.1 NAT Traversal Configuration .................................................................

311

19.7

ID Type and Content ......................................................................................

311

19.7.1 ID Type and Content Examples ............................................................

312

19.8

IKE Phases ....................................................................................................

313

19.8.1 Negotiation Mode ..................................................................................

314

19.8.2 Pre-Shared Key ....................................................................................

314

19.8.3 Diffie-Hellman (DH) Key Groups ...........................................................

315

19.8.4 Perfect Forward Secrecy (PFS) ...........................................................

315

19.9

X-Auth (Extended Authentication) ..................................................................

315

19.9.1 Authentication Server ...........................................................................

315

19.10 VPN Rules (IKE) .........................................................................................

316

19.11 VPN Rules (IKE) Gateway Policy Edit .........................................................

318

19.12 VPN Rules (IKE): Network Policy Edit ......................................................

324

19.13 VPN Rules (IKE): Network Policy Move .....................................................

328

19.14 VPN Rules (Manual) ...................................................................................

329

19.15 VPN Rules (Manual): Edit .........................................................................

331

19.15.1 Security Parameter Index (SPI) ..........................................................

331

19.16 VPN SA Monitor .........................................................................................

335

19.17 VPN Global Setting .....................................................................................

336

19.18 Telecommuter VPN/IPSec Examples ...........................................................

337

19.18.1 Telecommuters Sharing One VPN Rule Example ..............................

337

19.18.2 Telecommuters Using Unique VPN Rules Example ...........................

338

19.19 VPN and Remote Management ...................................................................

340

Chapter 20

 

 

Certificates............................................................................................................

342

20.1

Certificates Overview .....................................................................................

342

20.1.1 Advantages of Certificates ....................................................................

343

20.2

Self-signed Certificates ..................................................................................

343

20.3

Configuration Summary .................................................................................

343

20.4

My Certificates ..............................................................................................

344

20.5

My Certificate Import ....................................................................................

346

Table of Contents

18