11.7
VPN/IPSec ............................................................................................................................................. V
12.1
VPN Overview..............................................................................................................12-1
12.2
IPSec Architecture ........................................................................................................12-2
12.3
Encapsulation................................................................................................................12-3
12.4
IPSec and NAT .............................................................................................................12-4
Chapter 13 VPN Screens..............................................................................................................13-1
13.1
VPN/IPSec Overview ...................................................................................................13-1
13.2
IPSec Algorithms ..........................................................................................................13-1
13.3
My IP Address ..............................................................................................................13-2
13.4
Secure Gateway Address ..............................................................................................13-2
13.5
Summary Screen ...........................................................................................................13-3
13.6
Keep Alive ....................................................................................................................13-4
13.7
NAT Traversal ..............................................................................................................13-5
13.8
ID Type and Content.....................................................................................................13-6
13.9
Pre-Shared Key .............................................................................................................13-8
13.10
Editing VPN Policies ....................................................................................................13-8
13.11
IKE Phases ..................................................................................................................13-15
13.12
13.13
Manual Key Setup.......................................................................................................13-19
13.14
Configuring Manual Key ............................................................................................13-19
13.15
Viewing SA Monitor...................................................................................................13-23
13.16
13.17
13.18
Certificates............................................................................................................................................VI
Chapter 14 Certificates ................................................................................................................14-1
14.1
Certificates Overview ...................................................................................................14-1
14.2
Self-signed Certificates .................................................................................................14-2
14.3
Configuration Summary................................................................................................14-2
14.4
My Certificates..............................................................................................................14-2
14.5
Certificate File Formats ................................................................................................14-5
14.6
Importing a Certificate ..................................................................................................14-5
14.7
Creating a Certificate ....................................................................................................14-6
14.8
My Certificate Details...................................................................................................14-9
14.9
Trusted CAs ................................................................................................................14-12
14.10
14.11
14.12
Trusted Remote Hosts.................................................................................................14-18
14.13
14.14
14.15
14.16
Directory Servers ........................................................................................................14-24
14.17
NAT and Static Route ....................................................................................................................... VII
15.1
NAT Overview..............................................................................................................15-1
15.2
Using NAT....................................................................................................................15-4
15.3
SUA Server ...................................................................................................................15-4
15.4
Configuring SUA Server...............................................................................................15-6
Table of Contents
ZyWALL 5 Internet Security Appliance
ix