Is WPA Perfect? .................................................................................................... D-16
Product Support for WPA ...................................................................................... D-16
Appendix E
What is a VPN? ............................................................................................................. E-1
IPSec Security Features ......................................................................................... E-2
IPSec Components ................................................................................................. E-2
Mode ................................................................................................................. E-5
Key Management .................................................................................................... E-6
VPN Process Overview ................................................................................................. E-7
Interface Addressing ......................................................................................... E-7
Firewalls ........................................................................................................... E-8
Additional Reading .......................................................................................................E-11
Appendix F
DG834G to FVL328 ........................................................................................................F-1
Configuration Profile .................................................................................................F-1
xii
202-10006-05, June 2005
Contents