Prestige 334W User’s Guide

16.4.1 Dynamic Secure Gateway Address.......................................................................................

16-3

16.5

Summary Screen .....................................................................................................................

16-3

16.6

Keep Alive................................................................................................................................

16-5

16.7

NAT Traversal .........................................................................................................................

16-6

16.7.1

 

NAT Traversal Configuration...............................................................................................

16-6

16.7.2

 

Remote DNS Server..............................................................................................................

16-7

16.8

ID Type and Content...............................................................................................................

16-8

16.8.1 ID Type and Content Examples ............................................................................................

16-9

16.9

Pre-Shared Key .....................................................................................................................

16-10

16.10

Editing VPN Rules ................................................................................................................

16-10

16.11

IKE Phases.............................................................................................................................

16-15

16.11.1

Negotiation Mode ...........................................................................................................

16-17

16.11.2

Diffie-Hellman (DH) Key Groups ..................................................................................

16-17

16.11.3

Perfect Forward Secrecy (PFS).......................................................................................

16-18

16.12

Configuring Advanced IKE Settings ...................................................................................

16-18

16.13

Manual Key Setup ................................................................................................................

16-25

16.13.1

Security Parameter Index (SPI).......................................................................................

16-25

16.14

Configuring Manual Key .....................................................................................................

16-26

16.15

Viewing SA Monitor..............................................................................................................

16-30

16.16

Configuring Global Setting ..................................................................................................

16-32

16.17

Telecommuter VPN/IPSec Examples...................................................................................

16-33

16.17.1

Telecommuters Sharing One VPN Rule Example ..........................................................

16-33

16.17.2

Telecommuters Using Unique VPN Rules Example ......................................................

16-34

16.18

VPN and Remote Management ...........................................................................................

16-36

Logs, Media Bandwidth Management and Maintenance...........................................................................

VI

Chapter 17 Centralized Logs .....................................................................................................................

17-1

17.1

View Log ..................................................................................................................................

17-1

17.2

Log Settings .............................................................................................................................

17-2

Chapter 18 Media Bandwidth Management ............................................................................................

18-1

18.1

Bandwidth Management Overview.......................................................................................

18-1

18.1.1 Application-based Bandwidth Management Example ..........................................................

18-1

18.1.2 Subnet-based Bandwidth Management Example..................................................................

18-2

18.1.3 Application and Subnet-based Bandwidth Management Example .......................................

18-2

18.1.4

 

Bandwidth Usage Example...................................................................................................

18-3

18.1.5

 

Bandwidth Management Priorities........................................................................................

18-4

18.1.6

 

Bandwidth Management Services.........................................................................................

18-5

18.1.7

 

Services.................................................................................................................................

18-6

18.2

Configuration Screen..............................................................................................................

18-8

18.3

Editing Bandwidth Management Rules ..............................................................................

18-11

18.3.1

 

Bandwidth Borrowing.........................................................................................................

18-11

18.4

Configuring Bandwidth Management Rules and Services................................................

18-11

xiv

Table of Contents