ZyXEL Communications VANTAGE CNM User Manual page 11

Centralized network management
Hide thumbs Also See for VANTAGE CNM:
Table of Contents

Advertisement

9.4 Trigger Port Forwarding - ZyWALL ..................................................................143
Chapter 10
Configuration > Static Route............................................................................... 148
10.1 Static Route Overview ....................................................................................148
Configuration > VPN ............................................................................................ 152
11.1 VPN Overview ................................................................................................152
11.2 VPN Tunnel Summary ....................................................................................159
11.3 VPN and NetBIOS ..........................................................................................168
Table of Contents
9.3.3 Configuring SUA Servers - Prestige ......................................................140
9.3.4 Full Feature Address Mapping ................................................................141
9.3.5 Edit Full Feature Address Mapping ........................................................142
9.4.1 Configuring Trigger Port .........................................................................144
9.4.2 Edit Trigger Port ......................................................................................146
10.1.1 Static Route Summary ..........................................................................148
10.1.2 Edit Static Route ...................................................................................149
11.1.1 IPSec ....................................................................................................152
11.1.2 Security Association ..............................................................................152
11.1.3 Encryption .............................................................................................152
11.1.4 Data Confidentiality ...............................................................................152
11.1.5 Data Integrity .........................................................................................152
11.1.6 Data Origin Authentication ....................................................................153
11.1.7 IPSec Algorithms ..................................................................................153
11.1.7.1 AH (Authentication Header) Protocol ..........................................153
11.1.8 Key Management ..................................................................................154
11.1.9 Encapsulation .......................................................................................154
11.1.9.1 Transport Mode ...........................................................................154
11.1.9.2 Tunnel Mode ................................................................................154
11.1.10 IPSec and NAT ...................................................................................155
11.1.11 Keep Alive ...........................................................................................155
11.1.12 NAT Traversal .....................................................................................156
11.1.12.1 NAT Traversal Configuration .....................................................156
11.1.13 ID Type and Content ...........................................................................156
11.1.14 IKE Phases .........................................................................................157
11.1.15 Negotiation Mode ................................................................................158
11.1.16 Diffie-Hellman (DH) Key Groups .........................................................158
11.1.17 Perfect Forward Secrecy (PFS) ..........................................................159
11.1.18 Pre-Shared Key ..................................................................................159
11.2.1 Add a VPN Tunnel ................................................................................160
11.2.2 Manual VPN Tunnel ..............................................................................165
Vantage CNM User's Guide
10

Advertisement

Table of Contents
loading

Table of Contents