x
Contents
802.11 Authentication .............................................................................................. D-3
Open System Authentication ................................................................................... D-4
Shared Key Authentication ...................................................................................... D-4
Overview of WEP Parameters ................................................................................ D-5
Key Size .................................................................................................................. D-6
WEP Configuration Options .................................................................................... D-7
Wireless Channels ......................................................................................................... D-7
802/11b/g Wireless Channels ................................................................................. D-8
802/11a Legal Power Output and Wireless Channels ............................................. D-9
Appendix E
Virtual Private Networking
What is a VPN? ............................................................................................................. E-1
What Is IPSec and How Does It Work? ......................................................................... E-2
IPSec Security Features ......................................................................................... E-2
IPSec Components ................................................................................................. E-3
Encapsulating Security Payload (ESP) ................................................................... E-3
Authentication Header (AH) .................................................................................... E-4
IKE Security Association ......................................................................................... E-5
Mode ................................................................................................................. E-5
Key Management .................................................................................................... E-6
Understand the Process Before You Begin ................................................................... E-7
VPN Process Overview ................................................................................................. E-7
Network Interfaces and Addresses ......................................................................... E-8
Interface Addressing ......................................................................................... E-8
Firewalls ........................................................................................................... E-9
Setting Up a VPN Tunnel Between Gateways ........................................................ E-9
VPNC IKE Security Parameters ...................................................................................E-11
VPNC IKE Phase I Parameters ..............................................................................E-11
VPNC IKE Phase II Parameters ............................................................................ E-12
Testing and Troubleshooting ........................................................................................ E-12
Additional Reading ...................................................................................................... E-12
Glossary
List of Glossary Terms ................................................................................................... G-1
Index
Summary of Contents for ProSafe FWAG114
Page 4: ...iv ...
Page 20: ...Reference Manual for the ProSafe Dual Band Wireless VPN Firewall FWAG114 2 8 Introduction ...
Page 118: ...Reference Manual for the ProSafe Dual Band Wireless VPN Firewall FWAG114 9 8 Troubleshooting ...
Page 188: ...Reference Manual for the ProSafe Dual Band Wireless VPN Firewall FWAG114 8 Glossary ...