P-2602H(W)(L)-DxA Series User’s Guide
16
Table of Contents
16.1.1 IPSec
....................................................................................................
215
16.1.2 Security Association
.............................................................................
215
16.1.3 Other Terminology
................................................................................
215
16.1.3.1 Encryption
...................................................................................
215
16.1.3.2 Data Confidentiality
.....................................................................
216
16.1.3.3 Data Integrity
...............................................................................
216
16.1.3.4 Data Origin Authentication
..........................................................
216
16.1.4 VPN Applications
..................................................................................
216
16.2 IPSec Architecture
.........................................................................................
216
16.2.1 IPSec Algorithms
..................................................................................
217
16.2.2 Key Management
..................................................................................
217
16.3 Encapsulation
.................................................................................................
217
16.3.1 Transport Mode
....................................................................................
218
16.3.2 Tunnel Mode
........................................................................................
218
16.4 IPSec and NAT
...............................................................................................
218
Chapter 17
VPN Screens
.........................................................................................................
221
17.1 VPN/IPSec Overview
.....................................................................................
221
17.2 IPSec Algorithms
............................................................................................
221
17.2.1 AH (Authentication Header) Protocol
....................................................
221
17.2.2 ESP (Encapsulating Security Payload) Protocol
..................................
221
17.3 My IP Address
................................................................................................
222
17.4 Secure Gateway Address
..............................................................................
223
17.4.1 Dynamic Secure Gateway Address
......................................................
223
17.5 VPN Setup Screen
........................................................................................
223
17.6 Keep Alive
......................................................................................................
225
17.7 VPN, NAT, and NAT Traversal
.......................................................................
226
17.8 Remote DNS Server
......................................................................................
227
17.9 ID Type and Content
......................................................................................
227
17.9.1 ID Type and Content Examples
............................................................
229
17.10 Pre-Shared Key
............................................................................................
229
17.11 Editing VPN Policies
....................................................................................
229
17.12
IKE Phases
.................................................................................................
234
17.12.1 Negotiation Mode
................................................................................
235
17.12.2 Diffie-Hellman (DH) Key Groups
.........................................................
236
17.12.3 Perfect Forward Secrecy (PFS)
.........................................................
236
17.13 Configuring Advanced IKE Settings
............................................................
236
17.14 Manual Key Setup
........................................................................................
239
17.14.1 Security Parameter Index (SPI)
.........................................................
239
17.15 Configuring Manual Key
..............................................................................
239
17.16 Viewing SA Monitor
.....................................................................................
242
17.17 Configuring Global Setting
..........................................................................
244