P-662H/HW-D Series User’s Guide
Chapter 16 VPN Screens
251
Peer ID Type Select
IP
to identify the remote IPSec router by its IP address.
Select
DNS
to identify the remote IPSec router by a domain name.
Select
to identify the remote IPSec router by an e-mail address.
Content The configuration of the peer content depends on the peer ID type.
For
IP
, type the IP address of the computer with which you will make the VPN
connection. If you configure this field to
0.0.0.0
or leave it blank, the ZyXEL
Device will use the address in the
Secure Gateway Address
field (refer to the
Secure Gateway Address
field description).
For
DNS
or
, type a domain name or e-mail address by which to identify the
remote IPSec router. Use up to 31 ASCII characters including spaces, although
trailing spaces are truncated. The domain name or e-mail address is for
identification purposes only and can be any string.
It is recommended that you type an IP address other than
0.0.0.0
or use the
DNS
or
ID type in the following situations:
When there is a NAT router between the two IPSec routers.
When you want the ZyXEL Device to distinguish between VPN connection
requests that come in from remote IPSec routers with dynamic WAN IP
addresses.
Secure Gateway
Address
Type the WAN IP address or the URL (up to 31 characters) of the IPSec router
with which you're making the VPN connection. Set this field to
0.0.0.0
if the
remote IPSec router has a dynamic WAN IP address (the
Key Management
field
must be set to
IKE
).
In order to have more than one active rule with the
Secure Gateway Address
field set to
0.0.0.0
, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with
0.0.0.0
in the
Secure Gateway Address
field
and the LAN’s full IP address range as the local IP address, then you cannot
configure any other active rules with the
Secure Gateway Address
field set to
0.0.0.0
.
Security Protocol
VPN Protocol Select
ESP
if you want to use ESP (Encapsulation Security Payload). The ESP
protocol (RFC 2406) provides encryption as well as some of the services offered
by
AH
. If you select
ESP
here, you must select options from the
Encryption
Algorithm
and
Authentication Algorithm
fields (described below).
Pre-Shared Key Type your pre-shared key in this field. A pre-shared key identifies a
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate with
them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x” (zero
x), which is not counted as part of the 16 to 62 character range for the key. For
example, in "0x0123456789ABCDEF", “0x” denotes that the key is hexadecimal
and “0123456789ABCDEF” is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will receive
a “PYLD_MALFORMED” (payload malformed) packet if the same pre-shared key
is not used on both ends.
Certificate Select the
Certificate
radio button to identify the ZyXEL Device by a certificate.
Use the drop-down list box to select the certificate to use for this VPN tunnel. You
must have certificates already configured in the
My Certificates
screen. Click
My
Certificates
to go to the
My Certificates
screen where you can view the ZyXEL
Device's list of certificates.
Table 94
Edit VPN Policies
LABEL
DESCRIPTION
Summary of Contents for 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series
Page 2: ......
Page 10: ...P 662H HW D Series User s Guide 10 Customer Support ...
Page 24: ...P 662H HW D Series User s Guide 24 Table of Contents ...
Page 32: ...P 662H HW D Series User s Guide 32 List of Figures ...
Page 38: ...P 662H HW D Series User s Guide 38 List of Tables ...
Page 64: ...P 662H HW D Series User s Guide 64 Chapter 2 Introducing the Web Configurator ...
Page 84: ...P 662H HW D Series User s Guide 84 Chapter 4 Bandwidth Management Wizard ...
Page 108: ...P 662H HW D Series User s Guide 108 Chapter 5 WAN Setup ...
Page 122: ...P 662H HW D Series User s Guide 122 Chapter 6 LAN Setup ...
Page 156: ...P 662H HW D Series User s Guide 156 Chapter 8 DMZ ...
Page 202: ...P 662H HW D Series User s Guide 202 Chapter 11 Firewall Configuration ...
Page 210: ...P 662H HW D Series User s Guide 210 Chapter 12 Anti Virus Packet Scan ...
Page 214: ...P 662H HW D Series User s Guide 214 Chapter 13 Content Filtering ...
Page 232: ...P 662H HW D Series User s Guide 232 Chapter 14 Content Access Control ...
Page 238: ...P 662H HW D Series User s Guide 238 Chapter 15 Introduction to IPSec ...
Page 273: ...P 662H HW D Series User s Guide Chapter 17 Certificates 273 Figure 144 My Certificate Details ...
Page 292: ...P 662H HW D Series User s Guide 292 Chapter 18 Static Route ...
Page 304: ...P 662H HW D Series User s Guide 304 Chapter 19 Bandwidth Management ...
Page 308: ...P 662H HW D Series User s Guide 308 Chapter 20 Dynamic DNS Setup ...
Page 332: ...P 662H HW D Series User s Guide 332 Chapter 22 Universal Plug and Play UPnP ...
Page 338: ...P 662H HW D Series User s Guide 338 Chapter 23 System ...
Page 344: ...P 662H HW D Series User s Guide 344 Chapter 24 Logs ...
Page 350: ...P 662H HW D Series User s Guide 350 Chapter 25 Tools ...
Page 364: ...P 662H HW D Series User s Guide 364 Chapter 27 Troubleshooting ...
Page 368: ...P 662H HW D Series User s Guide 368 Product Specifications ...
Page 372: ...P 662H HW D Series User s Guide 372 Appendix C Wall mounting Instructions ...
Page 408: ...P 662H HW D Series User s Guide 408 Appendix F Wireless LANs ...
Page 420: ...P 662H HW D Series User s Guide 420 Appendix H Command Interpreter ...
Page 436: ...P 662H HW D Series User s Guide 436 Appendix L NetBIOS Filter Commands ...
Page 462: ...P 662H HW D Series User s Guide 462 Appendix M Internal SPTGEN ...
Page 484: ...P 662H HW D Series User s Guide 484 Appendix P Triangle Route ...