Vigor2926 Series User’s Guide
311
V
V
-
-
1
1
-
-
5
5
I
I
P
P
s
s
e
e
c
c
G
G
e
e
n
n
e
e
r
r
a
a
l
l
S
S
e
e
t
t
u
u
p
p
In IPsec General Setup, there are two major parts of configuration.
There are two phases of IPsec.
Phase 1: negotiation of IKE parameters including encryption, hash, Diffie-Hellman
parameter values, and lifetime to protect the following IKE exchange, authentication of
both peers using either a Pre-Shared Key or Digital Signature (x.509). The peer that
starts the negotiation proposes all its policies to the remote peer and then remote peer
tries to find a highest-priority match with its policies. Eventually to set up a secure
tunnel for IKE Phase 2.
Phase 2: negotiation IPsec security methods including Authentication Header (AH) or
Encapsulating Security Payload (ESP) for the following IKE exchange and mutual
examination of the secure tunnel establishment.
There are two encapsulation methods used in IPsec, Transport and Tunnel. The Transport
mode will add the AH/ESP payload and use original IP header to encapsulate the data payload
only. It can just apply to local packet, e.g., L2TP over IPsec. The Tunnel mode will not only
add the AH/ESP payload but also use a new IP header (Tunneled IP header) to encapsulate the
whole original IP packet.
Authentication Header (AH) provides data authentication and integrity for IP packets passed
between VPN peers. This is achieved by a keyed one-way hash function to the packet to
create a message digest. This digest will be put in the AH and transmitted along with packets.
On the receiving side, the peer will perform the same one-way hash on the packet and
compare the value with the one in the AH it receives.
Encapsulating Security Payload (ESP) is a security protocol that provides data confidentiality
and protection with optional authentication and replay detection service.
Available settings are explained as follows:
Item Description
IKE Authentication
Method
This usually applies to those are remote dial-in user or node
(LAN-to-LAN) which uses dynamic IP address and
IPsec-related VPN connections such as L2TP over IPsec and
IPsec tunnel. There are two methods offered by Vigor router
for you to authenticate the incoming data coming from
remote dial-in user, Certificate (X.509) and Pre-Shared
Содержание Vigor2926
Страница 1: ...i ...
Страница 4: ...Vigor2926 Series User s Guide iv ...
Страница 14: ......
Страница 16: ......
Страница 66: ...Vigor2926 Series User s Guide 50 This page is left blank ...
Страница 112: ...Vigor2926 Series User s Guide 96 ...
Страница 149: ...Vigor2926 Series User s Guide 133 ...
Страница 154: ...Vigor2926 Series User s Guide 138 ...
Страница 204: ...Vigor2926 Series User s Guide 188 ...
Страница 310: ...Vigor2926 Series User s Guide 294 This page is left blank ...
Страница 389: ...Vigor2926 Series User s Guide 373 5 If there is no error click Finish to complete wizard setting ...
Страница 410: ...Vigor2926 Series User s Guide 394 The items categorized under OTHERS ...
Страница 436: ...Vigor2926 Series User s Guide 420 ...
Страница 450: ...Vigor2926 Series User s Guide 434 ...
Страница 465: ...Vigor2926 Series User s Guide 449 ...
Страница 470: ...Vigor2926 Series User s Guide 454 ...
Страница 544: ...Vigor2926 Series User s Guide 528 ...
Страница 547: ...Vigor2926 Series User s Guide 531 ...
Страница 588: ...Vigor2926 Series User s Guide 572 ...
Страница 594: ...Vigor2926 Series User s Guide 578 It will be better to group VigorSwitch devices with the same model ...
Страница 610: ...Vigor2926 Series User s Guide 594 This page is left blank ...
Страница 688: ...Vigor2926 Series User s Guide 672 ...
Страница 696: ...Vigor2926 Series User s Guide 680 ...
Страница 700: ...Vigor2926 Series User s Guide 684 ...
Страница 702: ...Vigor2926 Series User s Guide 686 This page is left blank ...
Страница 703: ...Vigor2926 Series User s Guide 687 P Pa ar rt t X X T Te el ln ne et t C Co om mm ma an nd ds s ...
Страница 706: ...Vigor2926 Series User s Guide 690 ...
Страница 793: ...Vigor2926 Series User s Guide 777 Name First Interface Lan Included ip object index 0 1 1 2 2 0 3 0 4 0 5 0 6 0 7 0 ...