P-662H/HW-D Series User’s Guide

16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................

239

16.3

My IP Address ................................................................................................

240

16.4

Secure Gateway Address ..............................................................................

241

16.4.1 Dynamic Secure Gateway Address ......................................................

241

16.5

VPN Setup Screen ........................................................................................

241

16.6

Keep Alive ......................................................................................................

243

16.7

VPN, NAT, and NAT Traversal .......................................................................

244

16.8

Remote DNS Server ......................................................................................

245

16.9

ID Type and Content ......................................................................................

245

16.9.1 ID Type and Content Examples ............................................................

246

16.10

Pre-Shared Key ............................................................................................

247

16.11 Editing VPN Policies ....................................................................................

247

16.12

IKE Phases .................................................................................................

252

16.12.1 Negotiation Mode ................................................................................

253

16.12.2 Diffie-Hellman (DH) Key Groups .........................................................

254

16.12.3 Perfect Forward Secrecy (PFS) .........................................................

254

16.13 Configuring Advanced IKE Settings ............................................................

254

16.14

Manual Key Setup ........................................................................................

257

16.14.1 Security Parameter Index (SPI) .........................................................

257

16.15

Configuring Manual Key ..............................................................................

257

16.16

Viewing SA Monitor .....................................................................................

260

16.17

Configuring Global Setting ..........................................................................

261

16.18

Telecommuter VPN/IPSec Examples ...........................................................

262

16.18.1 Telecommuters Sharing One VPN Rule Example ..............................

262

16.18.2 Telecommuters Using Unique VPN Rules Example ...........................

263

16.19 VPN and Remote Management ...................................................................

264

Chapter 17

 

 

Certificates............................................................................................................

265

17.1

Certificates Overview .....................................................................................

265

17.1.1 Advantages of Certificates ....................................................................

266

17.2

Self-signed Certificates ..................................................................................

266

17.3

Configuration Summary .................................................................................

266

17.4

My Certificates ..............................................................................................

267

17.5

My Certificate Import .....................................................................................

269

17.5.1 Certificate File Formats .........................................................................

269

17.6

My Certificate Create ....................................................................................

270

17.7

My Certificate Details ....................................................................................

272

17.8

Trusted CAs .................................................................................................

275

17.9

Trusted CA Import ........................................................................................

277

17.10 Trusted CA Details .......................................................................................

278

17.11 Trusted Remote Hosts ................................................................................

280

17.12 Verifying a Trusted Remote Host’s Certificate ..............................................

282

18

Table of Contents