P-661H/HW Series User’s Guide
12.1.3.1 Encryption ...................................................................................
197
12.1.3.2 Data Confidentiality .....................................................................
198
12.1.3.3 Data Integrity ...............................................................................
12.1.3.4 Data Origin Authentication ..........................................................
12.1.4 VPN Applications ..................................................................................
12.2
IPSec Architecture .........................................................................................
199
12.2.1 IPSec Algorithms ..................................................................................
12.2.2 Key Management ..................................................................................
12.3
Encapsulation .................................................................................................
12.3.1 Transport Mode ....................................................................................
200
12.3.2 Tunnel Mode ........................................................................................
12.4
IPSec and NAT ...............................................................................................
Chapter 13
VPN Screens.........................................................................................................
203
13.1
VPN/IPSec Overview .....................................................................................
13.2
IPSec Algorithms ............................................................................................
13.2.1 AH (Authentication Header) Protocol ....................................................
13.2.2 ESP (Encapsulating Security Payload) Protocol ..................................
13.3
My IP Address ................................................................................................
204
13.4
Secure Gateway Address ..............................................................................
205
13.4.1 Dynamic Secure Gateway Address ......................................................
13.5
VPN Setup Screen .........................................................................................
13.6
Keep Alive ......................................................................................................
207
13.7
VPN, NAT, and NAT Traversal .......................................................................
13.8
Remote DNS Server ......................................................................................
208
13.9
ID Type and Content ......................................................................................
209
13.9.1 ID Type and Content Examples ............................................................
210
13.10 Pre-Shared Key ............................................................................................
211
13.11 Editing VPN Policies .....................................................................................
13.12 IKE Phases ..................................................................................................
216
13.12.1 Negotiation Mode ................................................................................
217
13.12.2 Diffie-Hellman (DH) Key Groups .........................................................
218
13.12.3 Perfect Forward Secrecy (PFS) .........................................................
13.13 Configuring Advanced IKE Settings .............................................................
13.14 Manual Key Setup ........................................................................................
221
13.14.1 Security Parameter Index (SPI) .........................................................
13.15 Configuring Manual Key ...............................................................................
13.16 Viewing SA Monitor ......................................................................................
224
13.17 Configuring Global Setting ...........................................................................
225
13.18 Telecommuter VPN/IPSec Examples ...........................................................
226
13.18.1 Telecommuters Sharing One VPN Rule Example ..............................
13.18.2 Telecommuters Using Unique VPN Rules Example ...........................
227
Table of Contents
17