ZyXEL Communications Vantage CNM User Manual page 12

Centralized network management
Hide thumbs Also See for Vantage CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
11.6 My ZyWALL ....................................................................................................173
11.7 Remote Gateway Address .............................................................................173
11.8 NAT Traversal .................................................................................................174
11.9 ID Type and Content ......................................................................................175
11.10 X-Auth (Extended Authentication) ................................................................179
11.11 VPN Screens ................................................................................................180
11.12 VPN Tunnel Summary (VPN version 1.0) ....................................................180
11.13 VPN and NetBIOS (VPN version 1.0) ..........................................................188
11.14 VPN Rules (IKE) (VPN version 1.1) .............................................................188
11.15 VPN Rules (Manual) (VPN version 1.1) .......................................................201
11.16 VPN Global Setting (VPN version 1.1) .........................................................206
11.17 Telecommuter VPN/IPSec Examples ...........................................................207
11.18 VPN and Remote Management ...................................................................210
Chapter 12
Configuration > Firewall ...................................................................................... 212
12.1 Types of DoS Attacks .....................................................................................212
11
11.5.2 ESP (Encapsulating Security Payload) Protocol ...................................171
11.5.3 Key Management ..................................................................................172
11.5.4 Encapsulation .......................................................................................172
11.5.4.1 Transport Mode ...........................................................................172
11.5.4.2 Tunnel Mode ................................................................................172
11.5.5 IPSec and NAT .....................................................................................172
11.7.1 Dynamic Remote Gateway Address .....................................................174
11.7.2 Keep Alive/Nailed Up ............................................................................174
11.8.1 NAT Traversal Configuration .................................................................175
11.9.1 ID Type and Content Examples ............................................................176
11.9.2 IKE Phases ...........................................................................................177
11.9.3 Negotiation Mode ..................................................................................178
11.9.4 Pre-Shared Key ....................................................................................178
11.9.5 Diffie-Hellman (DH) Key Groups ...........................................................179
11.9.6 Perfect Forward Secrecy (PFS) ............................................................179
11.10.1 Authentication Server ..........................................................................179
11.12.1 Add a VPN Tunnel ..............................................................................181
11.12.2 Manual VPN Tunnel ............................................................................185
11.14.1 VPN Rules (IKE) > Gateway Policy Add .............................................190
11.14.2 VPN Rules (IKE) > Network Policy Edit ..............................................196
11.14.3 VPN Rules (IKE) > Network Policy Move ............................................200
11.15.1 VPN Rules (Manual) > Edit ................................................................202
11.15.1.1 Security Parameter Index (SPI) .................................................202
11.17.1 Telecommuters Sharing One VPN Rule Example ...............................207
12.1.1 ICMP Vulnerability ...............................................................................214
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents