ZyXEL Communications ZyWall 35 User Manual page 15

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

13.2.1 IPSec Algorithms ..................................................................................229
13.2.2 Key Management ..................................................................................229
13.3 Encapsulation .................................................................................................229
13.3.1 Transport Mode ....................................................................................230
13.3.2 Tunnel Mode .........................................................................................230
13.4 IPSec and NAT ...............................................................................................230
VPN Screens......................................................................................................... 233
14.1 VPN/IPSec Overview .....................................................................................233
14.2 IPSec Algorithms ............................................................................................233
14.2.1 AH (Authentication Header) Protocol ....................................................233
14.2.2 ESP (Encapsulating Security Payload) Protocol ..................................233
14.3 My ZyWALL ....................................................................................................234
14.4 Remote Gateway Address .............................................................................234
14.4.1 Dynamic Remote Gateway Address .....................................................235
14.5 Nailed Up .......................................................................................................235
14.6 NAT Traversal ................................................................................................235
14.6.1 NAT Traversal Configuration .................................................................236
14.7 ID Type and Content ......................................................................................236
14.7.1 ID Type and Content Examples ............................................................237
14.8 IKE Phases ....................................................................................................238
14.8.1 Negotiation Mode ..................................................................................239
14.8.2 Pre-Shared Key ....................................................................................239
14.8.3 Diffie-Hellman (DH) Key Groups ...........................................................240
14.8.4 Perfect Forward Secrecy (PFS) ...........................................................240
14.9 X-Auth (Extended Authentication) ..................................................................240
14.9.1 Authentication Server ...........................................................................240
14.10 Icons Key .....................................................................................................241
14.11 IPSec Fields Summary .................................................................................241
14.12 IKE VPN Rule Summary Screen ..................................................................242
14.12.1 Configuring an IKE Gateway Policy ....................................................243
14.12.2 Configuring an IKE Network Policy .....................................................249
14.13 Manual VPN Rule Summary Screen ............................................................254
14.13.1 Editing Manual VPN Rules .................................................................256
14.13.2 Security Parameter Index (SPI) ..........................................................256
14.14 Viewing SA Monitor ......................................................................................260
14.15 Configuring Global Setting ...........................................................................261
14.16 Telecommuter VPN/IPSec Examples ...........................................................262
14.16.1 Telecommuters Sharing One VPN Rule Example ..............................262
14.17 VPN and Remote Management ...................................................................264
ZyWALL 35 User's Guide
13

Advertisement

Table of Contents
loading

Table of Contents