ZyXEL Communications Network Device P-2602 User Manual page 16

802.11g wireless adsl2+ voip iad/adsl2+ voip iad
Table of Contents

Advertisement

P-2602H(W)(L)-DxA Series User's Guide
16.2 IPSec Architecture .........................................................................................216
16.3 Encapsulation .................................................................................................217
16.4 IPSec and NAT ...............................................................................................218
VPN Screens......................................................................................................... 221
17.1 VPN/IPSec Overview .....................................................................................221
17.2 IPSec Algorithms ............................................................................................221
17.3 My IP Address ................................................................................................222
17.4 Secure Gateway Address ..............................................................................223
17.5 VPN Setup Screen ........................................................................................223
17.6 Keep Alive ......................................................................................................225
17.7 VPN, NAT, and NAT Traversal .......................................................................226
17.8 Remote DNS Server ......................................................................................227
17.9 ID Type and Content ......................................................................................227
17.10 Pre-Shared Key ............................................................................................229
17.11 Editing VPN Policies ....................................................................................229
17.12 IKE Phases .................................................................................................234
17.13 Configuring Advanced IKE Settings ............................................................236
17.14 Manual Key Setup ........................................................................................239
17.15 Configuring Manual Key ..............................................................................239
17.16 Viewing SA Monitor .....................................................................................242
17.17 Configuring Global Setting ..........................................................................244
16
16.1.1 IPSec ....................................................................................................215
16.1.2 Security Association .............................................................................215
16.1.3 Other Terminology ................................................................................215
16.1.3.1 Encryption ...................................................................................215
16.1.3.2 Data Confidentiality .....................................................................216
16.1.3.3 Data Integrity ...............................................................................216
16.1.3.4 Data Origin Authentication ..........................................................216
16.1.4 VPN Applications ..................................................................................216
16.2.1 IPSec Algorithms ..................................................................................217
16.2.2 Key Management ..................................................................................217
16.3.1 Transport Mode ....................................................................................218
16.3.2 Tunnel Mode ........................................................................................218
17.2.1 AH (Authentication Header) Protocol ....................................................221
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................221
17.4.1 Dynamic Secure Gateway Address ......................................................223
17.9.1 ID Type and Content Examples ............................................................229
17.12.1 Negotiation Mode ................................................................................235
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................236
17.12.3 Perfect Forward Secrecy (PFS) .........................................................236
17.14.1 Security Parameter Index (SPI) .........................................................239
Table of Contents

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents