ZyXEL Communications ZyWall 35 User Manual page 15

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

14.5 Summary Screen ...........................................................................................241
14.6 Keep Alive ......................................................................................................243
14.7 NAT Traversal ................................................................................................243
14.7.1 NAT Traversal Configuration .................................................................244
14.7.2 X-Auth (Extended Authentication) ........................................................244
14.7.3 Remote DNS Server .............................................................................244
14.8 ID Type and Content ......................................................................................245
14.8.1 ID Type and Content Examples ............................................................246
14.9 Pre-Shared Key ..............................................................................................247
14.10 Editing VPN Policies ....................................................................................247
14.11 IKE Phases ...................................................................................................254
14.11.1 X-Auth and IKE ...................................................................................255
14.11.2 Negotiation Mode ................................................................................255
14.11.3 Diffie-Hellman (DH) Key Groups .........................................................255
14.11.4 Perfect Forward Secrecy (PFS) ..........................................................256
14.12 Configuring Advanced VPN Rule .................................................................256
14.13 Manual Key Setup ........................................................................................258
14.13.1 Security Parameter Index (SPI) ..........................................................258
14.14 Configuring Manual Key ...............................................................................259
14.15 Viewing SA Monitor ......................................................................................262
14.16 Configuring Global Setting ...........................................................................263
14.17 Telecommuter VPN/IPSec Examples ...........................................................264
14.17.1 Telecommuters Sharing One VPN Rule Example ..............................264
14.18 VPN and Remote Management ...................................................................266
Certificates............................................................................................................ 267
15.1 Certificates Overview .....................................................................................267
15.1.1 Advantages of Certificates ....................................................................268
15.2 Self-signed Certificates ..................................................................................268
15.3 Configuration Summary .................................................................................268
15.4 My Certificates ...............................................................................................268
15.5 Certificate File Formats ..................................................................................270
15.6 Importing a Certificate ....................................................................................271
15.7 Creating a Certificate .....................................................................................272
15.8 My Certificate Details .....................................................................................274
15.9 Trusted CAs ...................................................................................................277
15.10 Importing a Trusted CA's Certificate .............................................................279
15.11 Trusted CA Certificate Details ......................................................................280
15.12 Trusted Remote Hosts .................................................................................283
15.13 Verifying a Trusted Remote Host's Certificate ..............................................285
15.13.1 Trusted Remote Host Certificate Fingerprints .....................................285
ZyWALL 35 User's Guide
13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 70

Table of Contents