
Prestige 334W User’s Guide
xiv Table of Contents
16.4.1 Dynamic Secure Gateway Address.......................................................................................16-3
16.5 Summary Screen .....................................................................................................................16-3
16.6 Keep Alive................................................................................................................................16-5
16.7 NAT Traversal .........................................................................................................................16-6
16.7.1 NAT Traversal Configuration...............................................................................................16-6
16.7.2 Remote DNS Server..............................................................................................................16-7
16.8 ID Type and Content...............................................................................................................16-8
16.8.1 ID Type and Content Examples ............................................................................................16-9
16.9 Pre-Shared Key .....................................................................................................................16-10
16.10 Editing VPN Rules ................................................................................................................16-10
16.11 IKE Phases.............................................................................................................................16-15
16.11.1 Negotiation Mode ...........................................................................................................16-17
16.11.2 Diffie-Hellman (DH) Key Groups ..................................................................................16-17
16.11.3 Perfect Forward Secrecy (PFS).......................................................................................16-18
16.12 Configuring Advanced IKE Settings ...................................................................................16-18
16.13 Manual Key Setup ................................................................................................................16-25
16.13.1 Security Parameter Index (SPI).......................................................................................16-25
16.14 Configuring Manual Key .....................................................................................................16-26
16.15 Viewing SA Monitor..............................................................................................................16-30
16.16 Configuring Global Setting ..................................................................................................16-32
16.17 Telecommuter VPN/IPSec Examples...................................................................................16-33
16.17.1 Telecommuters Sharing One VPN Rule Example ..........................................................16-33
16.17.2 Telecommuters Using Unique VPN Rules Example ......................................................16-34
16.18 VPN and Remote Management ...........................................................................................16-36
Logs, Media Bandwidth Management and Maintenance...........................................................................VI
Chapter 17 Centralized Logs .....................................................................................................................17-1
17.1 View Log ..................................................................................................................................17-1
17.2 Log Settings .............................................................................................................................17-2
Chapter 18 Media Bandwidth Management ............................................................................................18-1
18.1 Bandwidth Management Overview.......................................................................................18-1
18.1.1 Application-based Bandwidth Management Example..........................................................18-1
18.1.2 Subnet-based Bandwidth Management Example..................................................................18-2
18.1.3 Application and Subnet-based Bandwidth Management Example .......................................18-2
18.1.4 Bandwidth Usage Example...................................................................................................18-3
18.1.5 Bandwidth Management Priorities........................................................................................18-4
18.1.6 Bandwidth Management Services.........................................................................................18-5
18.1.7 Services.................................................................................................................................18-6
18.2 Configuration Screen..............................................................................................................18-8
18.3 Editing Bandwidth Management Rules .............................................................................. 18-11
18.3.1 Bandwidth Borrowing.........................................................................................................18-11
18.4 Configuring Bandwidth Management Rules and Services................................................ 18-11
Kommentare zu diesen Handbüchern