Prestige 661H/HW Series User’s Guide
13 Table of Contents
Chapter 14
Introduction to IPSec ........................................................................................... 170
14.1 VPN Overview ................................................................................................170
14.1.1 IPSec ....................................................................................................170
14.1.2 Security Association .............................................................................170
14.1.3 Other Terminology ................................................................................170
14.1.3.1 Encryption ...................................................................................170
14.1.3.2 Data Confidentiality .....................................................................171
14.1.3.3 Data Integrity ...............................................................................171
14.1.3.4 Data Origin Authentication ..........................................................171
14.1.4 VPN Applications ..................................................................................171
14.2 IPSec Architecture .........................................................................................171
14.2.1 IPSec Algorithms ..................................................................................172
14.2.2 Key Management ..................................................................................172
14.3 Encapsulation .................................................................................................172
14.3.1 Transport Mode ....................................................................................173
14.3.2 Tunnel Mode ........................................................................................173
14.4 IPSec and NAT ...............................................................................................173
Chapter 15
VPN Screens......................................................................................................... 176
15.1 VPN/IPSec Overview .....................................................................................176
15.2 IPSec Algorithms ............................................................................................176
15.2.1 AH (Authentication Header) Protocol ....................................................176
15.2.2 ESP (Encapsulating Security Payload) Protocol ..................................177
15.3 My IP Address ................................................................................................177
15.4 Secure Gateway Address ..............................................................................178
15.4.1 Dynamic Secure Gateway Address ......................................................178
15.5 VPN Summary Screen ...................................................................................178
15.6 Keep Alive ......................................................................................................180
15.7 Remote DNS Server ......................................................................................180
15.8 ID Type and Content ......................................................................................181
15.8.1 ID Type and Content Examples ............................................................182
15.9 Pre-Shared Key ..............................................................................................183
15.10 Editing VPN Policies ....................................................................................183
15.11 IKE Phases ..................................................................................................188
15.11.1 Negotiation Mode ................................................................................189
15.11.2 Diffie-Hellman (DH) Key Groups .........................................................189
15.11.3 Perfect Forward Secrecy (PFS) .........................................................190
15.12 Configuring Advanced IKE Settings .............................................................190
15.13 Manual Key Setup ........................................................................................193
15.13.1 Security Parameter Index (SPI) .........................................................193
15.14 Configuring Manual Key ...............................................................................194