Table of Contents
16.2.1 Add/Edit a Schedule ............................................................................................................202
Certificates ........................................................................................................................................ 203
17.1 Overview .......................................................................................................................................203
17.2 What You Need to Know ...............................................................................................................203
17.4 The Trusted CA Screen ................................................................................................................206
VPN .................................................................................................................................................... 211
18.1 Overview ....................................................................................................................................... 211
18.5 Technical Reference ......................................................................................................................218
18.5.1 IPSec Architecture ...............................................................................................................218
18.5.2 Encapsulation ......................................................................................................................219
18.5.3 IKE Phases .........................................................................................................................220
18.5.4 Negotiation Mode ................................................................................................................221
18.5.5 IPSec and NAT ....................................................................................................................222
18.5.7 ID Type and Content ............................................................................................................223
18.5.8 Pre-Shared Key ...................................................................................................................224
Log .................................................................................................................................................... 225
19.1 Overview .......................................................................................................................................225
19.2 The System Log Screen ................................................................................................................226
19.3 The Security Log Screen ...............................................................................................................227
Traffic Status .................................................................................................................................... 229
20.1 Overview .......................................................................................................................................229
10
eir F1000 Modem User's Guide