ZyXEL Communications 792H Router User Manual


 
Prestige 792H G.SHDSL Router
Table of Contents xi
13.2 IPSec Architecture ...................................................................................................................13-3
13.2.1 IPSec Algorithms .....................................................................................................................13-4
13.2.2 Key Management .....................................................................................................................13-4
13.3 Encapsulation ...........................................................................................................................13-5
13.3.1 Transport Mode........................................................................................................................13-5
13.3.2 Tunnel Mode............................................................................................................................13-5
13.4 IPSec and NAT ........................................................................................................................13-5
Chapter 14 VPN Screens ...........................................................................................................................14-1
14.1 VPN/IPSec Overview...............................................................................................................14-1
14.2 IPSec Algorithms .....................................................................................................................14-1
14.2.1 AH (Authentication Header) Protocol......................................................................................14-1
14.2.2 ESP (Encapsulating Security Payload) Protocol ......................................................................14-1
14.3 My IP Address..........................................................................................................................14-2
14.4 Secure Gateway Address..........................................................................................................14-2
14.4.1 Dynamic Secure Gateway Address ..........................................................................................14-2
14.5 VPN Summary Screen .............................................................................................................14-3
14.6 Keep Alive ...............................................................................................................................14-5
14.7 ID Type and Content................................................................................................................14-5
14.7.1 ID Type and Content Examples ...............................................................................................14-6
14.8 Pre-Shared Key ........................................................................................................................14-7
14.9 Editing VPN Policies ...............................................................................................................14-7
14.10 IKE Phases .............................................................................................................................14-13
14.10.1 Negotiation Mode...........................................................................................................14-14
14.10.2 Diffie-Hellman (DH) Key Groups .................................................................................14-14
14.10.3 Perfect Forward Secrecy (PFS) ......................................................................................14-15
14.11 Configuring Advanced IKE Settings......................................................................................14-15
14.12 Manual Key Setup..................................................................................................................14-19
14.12.1 Security Parameter Index (SPI)......................................................................................14-19
14.13 Configuring Manual Key .......................................................................................................14-20
14.14 Viewing SA Monitor..............................................................................................................14-24
14.15 Configuring Global Setting ....................................................................................................14-26
14.16 Configuring IPSec Logs.........................................................................................................14-27
14.17 Telecommuter VPN/IPSec Examples ....................................................................................14-31
14.17.1 Telecommuters Sharing One VPN Rule Example .........................................................14-31
14.17.2 Telecommuters Using Unique VPN Rules Example......................................................14-32
14.18 VPN and Remote Management..............................................................................................14-33
Chapter 15 Remote Management Configuration ....................................................................................15-1
15.1 Remote Management Overview...............................................................................................15-1
15.1.1 Remote Management Limitations ............................................................................................15-1
15.1.2 Remote Management and NAT................................................................................................15-1
15.1.3 System Timeout .......................................................................................................................15-2