Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
-7
202-10085-01, March 2005
MacOS X
...............................................................................................................
C-16
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-17
Verifying the Readiness of Your Internet Account
.......................................................
C-18
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Virtual Private Networking
What is a VPN?
.............................................................................................................
D-1
What Is IPSec and How Does It Work?
.........................................................................
D-2
IPSec Security Features
.........................................................................................
D-2
IPSec Components
.................................................................................................
D-2
Encapsulating Security Payload (ESP)
...................................................................
D-3
Authentication Header (AH)
....................................................................................
D-4
IKE Security Association
.........................................................................................
D-4
Mode
.................................................................................................................
D-5
Key Management
....................................................................................................
D-6
Understand the Process Before You Begin
...................................................................
D-6
VPN Process Overview
.................................................................................................
D-7
Network Interfaces and Addresses
.........................................................................
D-7
Interface Addressing
.........................................................................................
D-7
Firewalls
...........................................................................................................
D-8
Setting Up a VPN Tunnel Between Gateways
........................................................
D-8
VPNC IKE Security Parameters
..................................................................................
D-10
VPNC IKE Phase I Parameters
.............................................................................
D-10
VPNC IKE Phase II Parameters
............................................................................
D-11
Testing and Troubleshooting
........................................................................................
D-11
Additional Reading
......................................................................................................
D-11
Glossary
List of Glossary Terms
........................................................................................
Glossary-1
Numeric
..............................................................................................................
Glossary-1
A
.........................................................................................................................
Glossary-2
B
.........................................................................................................................
Glossary-2