Table 16-7 Vpn Ike - ZyXEL Communications Prestige 662HW Series User Manual

802.11g wireless adsl 2+ 4 port security gateway
Hide thumbs Also See for Prestige 662HW Series:
Table of Contents

Advertisement

LABEL
IPSec Setup
Active
Keep Alive
NAT Traversal
Name
IPSec Key Mode
Negotiation Mode
Encapsulation Mode
DNS Server (for IPSec
VPN)
Local
Local Address Type
IP Address Start
VPN Screens

Table 16-7 VPN IKE

Select this check box to activate this VPN policy. This option determines whether a
VPN rule is applied before a packet leaves the firewall.
Select either Yes or No from the drop-down list box.
Select Yes to have the Prestige automatically reinitiate the SA after the SA lifetime
times out, even if there is no traffic. The remote IPSec router must also have keep alive
enabled in order for this feature to work.
Select this check box to enable NAT traversal. NAT traversal allows you to set up a
VPN connection when there are NAT routers between the two IPSec routers.
The remote IPSec router must also have NAT traversal enabled.
You can use NAT traversal with ESP protocol using Transport or Tunnel mode, but
not with AH protocol nor with manual key management. In order for an IPSec router
behind a NAT router to receive an initiating IPSec packet, set the NAT router to forward
UDP port 500 to the IPSec router behind the NAT router.
Type up to 32 characters to identify this VPN policy. You may use any character,
including spaces, but the Prestige drops trailing spaces.
Select IKE or Manual from the drop-down list box. IKE provides more protection so it is
generally recommended. Manual is a useful option for troubleshooting if you have
problems using IKE key management.
Select Main or Aggressive from the drop-down list box. Multiple SAs connecting
through a secure gateway must have the same negotiation mode.
Select Tunnel mode or Transport mode from the drop-down list box.
If there is a private DNS server that services the VPN, type its IP address here. The
Prestige assigns this additional DNS server to the Prestige's DHCP clients that have IP
addresses in this IPSec rule's range of local addresses.
A DNS server allows clients on the VPN to find other computers and servers on the
VPN by their (private) domain names.
Local IP addresses must be static and correspond to the remote IPSec router's
configured remote IP addresses.
Two active SAs can have the same configured local or remote IP address, but not both.
You can configure multiple SAs between the same local and remote IP addresses, as
long as only one is active at any time.
In order to have more than one active rule with the Secure Gateway Address field set
to 0.0.0.0, the ranges of the local IP addresses cannot overlap between rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field and
the LAN's full IP address range as the local IP address, then you cannot configure any
other active rules with the Secure Gateway Address field set to 0.0.0.0.
Use the drop-down menu to choose Single, Range, or Subnet. Select Single for a
single IP address. Select Range for a specific range of IP addresses. Select Subnet to
specify IP addresses on a network by their subnet mask.
When the Local Address Type field is configured to Single, enter a (static) IP address
on the LAN behind your Prestige. When the Local Address Type field is configured to
Range, enter the beginning (static) IP address, in a range of computers on your LAN
behind your Prestige. When the Local Address Type field is configured to Subnet,
this is a (static) IP address on the LAN behind your Prestige.
Prestige 662HW Series User's Guide
DESCRIPTION
16-9

Advertisement

Table of Contents
loading

Table of Contents