ZyXEL Communications VANTAGE CNM 2.0 User Manual page 9

Centralized network management
Hide thumbs Also See for VANTAGE CNM 2.0:
Table of Contents

Advertisement

9.4 Trigger Port Forwarding - ZyWALL ..................................................................139
Chapter 10
Configuration > Static Route............................................................................... 144
10.1 Static Route Overview ....................................................................................144
Configuration > VPN ............................................................................................ 148
11.1 VPN Overview ................................................................................................148
11.2 VPN Tunnel Summary ....................................................................................155
11.3 VPN and NetBIOS ..........................................................................................164
Table of Contents
9.3.3 Configuring SUA Servers - Prestige ......................................................136
9.3.4 Full Feature Address Mapping ................................................................137
9.3.5 Edit Full Feature Address Mapping ........................................................138
9.4.1 Configuring Trigger Port .........................................................................140
9.4.2 Edit Trigger Port ......................................................................................142
10.1.1 Static Route Summary ..........................................................................144
10.1.2 Edit Static Route ...................................................................................145
11.1.1 IPSec ....................................................................................................148
11.1.2 Security Association ..............................................................................148
11.1.3 Encryption .............................................................................................148
11.1.4 Data Confidentiality ...............................................................................148
11.1.5 Data Integrity .........................................................................................148
11.1.6 Data Origin Authentication ....................................................................149
11.1.7 IPSec Algorithms ..................................................................................149
11.1.7.1 AH (Authentication Header) Protocol ..........................................149
11.1.8 Key Management ..................................................................................150
11.1.9 Encapsulation .......................................................................................150
11.1.9.1 Transport Mode ...........................................................................150
11.1.9.2 Tunnel Mode ................................................................................150
11.1.10 IPSec and NAT ...................................................................................151
11.1.11 Keep Alive ...........................................................................................151
11.1.12 NAT Traversal .....................................................................................152
11.1.12.1 NAT Traversal Configuration .....................................................152
11.1.13 ID Type and Content ...........................................................................152
11.1.14 IKE Phases .........................................................................................153
11.1.15 Negotiation Mode ................................................................................154
11.1.16 Diffie-Hellman (DH) Key Groups .........................................................154
11.1.17 Perfect Forward Secrecy (PFS) ..........................................................155
11.1.18 Pre-Shared Key ..................................................................................155
11.2.1 Add a VPN Tunnel ................................................................................156
11.2.2 Manual VPN Tunnel ..............................................................................161
Vantage CNM 2.0 User's Guide
10

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm v2.0

Table of Contents