P-335 Series User’s Guide
Table of Contents 15
15.1.2 Remote Management and NAT ............................................................198
15.1.3 System Timeout ...................................................................................198
15.2 Configuring WWW ..........................................................................................198
15.3 Configuring Telnet ..........................................................................................199
15.4 Configuring TELNET ......................................................................................200
15.5 Configuring FTP .............................................................................................201
15.6 SNMP .............................................................................................................202
15.6.1 Supported MIBs ....................................................................................203
15.6.2 SNMP Traps .........................................................................................203
15.6.3 Configuring SNMP ................................................................................203
15.7 Configuring DNS ............................................................................................205
15.8 Configuring Security .......................................................................................206
Chapter 16
Introduction to IPSec ........................................................................................... 209
16.1 VPN Overview ................................................................................................209
16.1.1 IPSec ....................................................................................................209
16.1.2 Security Association .............................................................................209
16.1.3 Other Terminology ................................................................................209
16.1.3.1 Encryption ...................................................................................209
16.1.3.2 Data Confidentiality .....................................................................210
16.1.3.3 Data Integrity ...............................................................................210
16.1.3.4 Data Origin Authentication ..........................................................210
16.1.4 VPN Applications ..................................................................................210
16.2 IPSec Architecture .........................................................................................210
16.2.1 IPSec Algorithms ..................................................................................211
16.2.2 Key Management ..................................................................................211
16.3 Encapsulation .................................................................................................211
16.3.1 Transport Mode ....................................................................................212
16.3.2 Tunnel Mode .........................................................................................212
16.4 IPSec and NAT ...............................................................................................212
Chapter 17
VPN Screens....................................................................................................... 215
17.1 VPN/IPSec Overview .....................................................................................215
17.2 IPSec Algorithms ............................................................................................215
17.2.1 AH (Authentication Header) Protocol ....................................................215
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................215
17.3 My IP Address ................................................................................................216
17.4 Secure Gateway Address ..............................................................................216
17.4.1 Dynamic Secure Gateway Address ......................................................217
17.5 Summary Screen ...........................................................................................217
17.6 Keep Alive ......................................................................................................219