Chapter 24 Call Scheduling .................................................................................................................. 24-1
24.1
Introduction .......................................................................................................................... 24-1
25.1
Introduction .......................................................................................................................... 25-1
25.1.1
VPN.................................................................................................................................. 25-1
25.1.2
IPSec................................................................................................................................. 25-1
25.1.3
Security Association......................................................................................................... 25-1
25.1.4
Other Terminology ........................................................................................................... 25-1
25.1.5
VPN Applications............................................................................................................. 25-2
25.2
IPSec Architecture................................................................................................................ 25-3
25.2.1
IPSec Algorithms.............................................................................................................. 25-4
25.2.2
Key Management.............................................................................................................. 25-4
25.3
Encapsulation ....................................................................................................................... 25-5
25.3.1
Transport Mode ................................................................................................................ 25-5
25.3.2
Tunnel Mode .................................................................................................................... 25-5
25.4
IPSec and NAT..................................................................................................................... 25-5
Chapter 26 VPN/IPSec Setup................................................................................................................ 26-1
26.1
VPN/IPSec Setup ................................................................................................................. 26-1
26.2
IPSec Algorithms.................................................................................................................. 26-2
26.2.1
26.2.2
26.3
IPSec Summary .................................................................................................................... 26-3
26.3.1
My IP Address.................................................................................................................. 26-4
26.3.2
Secure Gateway Address .................................................................................................. 26-4
26.4
IPSec Setup........................................................................................................................... 26-9
26.5
IKE Setup ........................................................................................................................... 26-12
26.5.1
IKE Phases ..................................................................................................................... 26-12
Table of Contents
ZYWALL 10/10 II/50 Internet Security Gateway
xvii