P-662H/HW-D Series User’s Guide
16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................
239
16.3
My IP Address ................................................................................................
240
16.4
Secure Gateway Address ..............................................................................
241
16.4.1 Dynamic Secure Gateway Address ......................................................
16.5
VPN Setup Screen ........................................................................................
16.6
Keep Alive ......................................................................................................
243
16.7
VPN, NAT, and NAT Traversal .......................................................................
244
16.8
Remote DNS Server ......................................................................................
245
16.9
ID Type and Content ......................................................................................
16.9.1 ID Type and Content Examples ............................................................
246
16.10
Pre-Shared Key ............................................................................................
247
16.11 Editing VPN Policies ....................................................................................
16.12
IKE Phases .................................................................................................
252
16.12.1 Negotiation Mode ................................................................................
253
16.12.2 Diffie-Hellman (DH) Key Groups .........................................................
254
16.12.3 Perfect Forward Secrecy (PFS) .........................................................
16.13 Configuring Advanced IKE Settings ............................................................
16.14
Manual Key Setup ........................................................................................
257
16.14.1 Security Parameter Index (SPI) .........................................................
16.15
Configuring Manual Key ..............................................................................
16.16
Viewing SA Monitor .....................................................................................
260
16.17
Configuring Global Setting ..........................................................................
261
16.18
Telecommuter VPN/IPSec Examples ...........................................................
262
16.18.1 Telecommuters Sharing One VPN Rule Example ..............................
16.18.2 Telecommuters Using Unique VPN Rules Example ...........................
263
16.19 VPN and Remote Management ...................................................................
264
Chapter 17
Certificates............................................................................................................
265
17.1
Certificates Overview .....................................................................................
17.1.1 Advantages of Certificates ....................................................................
266
17.2
Self-signed Certificates ..................................................................................
17.3
Configuration Summary .................................................................................
17.4
My Certificates ..............................................................................................
267
17.5
My Certificate Import .....................................................................................
269
17.5.1 Certificate File Formats .........................................................................
17.6
My Certificate Create ....................................................................................
270
17.7
My Certificate Details ....................................................................................
272
17.8
Trusted CAs .................................................................................................
275
17.9
Trusted CA Import ........................................................................................
277
17.10 Trusted CA Details .......................................................................................
278
17.11 Trusted Remote Hosts ................................................................................
280
17.12 Verifying a Trusted Remote Host’s Certificate ..............................................
282
18
Table of Contents