Table of Contents
P-661H/HW Series User’s Guide
16
10.4 Configuring Trusted Computers ...................................................................................... 173
Chapter 11
Introduction to IPSec............................................................................................................ 175
11.1 VPN Overview .................................................................................................................. 175
11.1.1 IPSec ...................................................................................................................... 175
11.1.2 Security Association ............................................................................................... 175
11.1.3 Other Terminology .................................................................................................. 175
11.1.4 VPN Applications .................................................................................................... 176
11.2 IPSec Architecture ........................................................................................................... 176
11.2.1 IPSec Algorithms .................................................................................................... 177
11.2.2 Key Management ................................................................................................... 177
11.3 Encapsulation .................................................................................................................. 177
11.3.1 Transport Mode ...................................................................................................... 178
11.3.2 Tunnel Mode .......................................................................................................... 178
11.4 IPSec and NAT ................................................................................................................ 178
Chapter 12
VPN Screens.......................................................................................................................... 181
12.1 VPN/IPSec Overview ....................................................................................................... 181
12.2 IPSec Algorithms ............................................................................................................. 181
12.2.1 AH (Authentication Header) Protocol ..................................................................... 181
12.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 181
12.3 My IP Address ................................................................................................................. 182
12.4 Secure Gateway Address ................................................................................................ 182
12.4.1 Dynamic Secure Gateway Address ....................................................................... 183
12.5 VPN Setup Screen ..........................................................................................................183
12.6 Keep Alive ....................................................................................................................... 185
12.7 VPN, NAT, and NAT Traversal ......................................................................................... 185
12.8 Remote DNS Server ........................................................................................................ 186
12.9 ID Type and Content ........................................................................................................ 187
12.9.1 ID Type and Content Examples ............................................................................. 188
12.10 Pre-Shared Key ............................................................................................................. 188
12.11 Editing VPN Policies ...................................................................................................... 188
12.12 IKE Phases .................................................................................................................... 193
12.12.1 Negotiation Mode ................................................................................................. 194
12.12.2 Diffie-Hellman (DH) Key Groups .......................................................................... 194
12.12.3 Perfect Forward Secrecy (PFS) .......................................................................... 194
12.13 Configuring Advanced IKE Settings .............................................................................. 195
12.14 Manual Key Setup .........................................................................................................197
12.14.1 Security Parameter Index (SPI) .......................................................................... 197
12.15 Configuring Manual Key ................................................................................................ 197
12.16 Viewing SA Monitor .......................................................................................................200