Reference Manual for the ProSafe VPN Firewall 200 FVX538
-7
January 2005
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
C-8
DHCP Configuration of TCP/IP in Windows XP
.....................................................
C-8
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-10
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-15
Configuring the Macintosh for TCP/IP Networking
......................................................
C-16
MacOS 8.6 or 9.x
..................................................................................................
C-16
MacOS X
...............................................................................................................
C-16
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-17
Verifying the Readiness of Your Internet Account
.......................................................
C-18
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Virtual Private Networking
What is a VPN?
.............................................................................................................
D-1
What Is IPSec and How Does It Work?
.........................................................................
D-2
IPSec Security Features
.........................................................................................
D-2
IPSec Components
.................................................................................................
D-2
Encapsulating Security Payload (ESP)
...................................................................
D-3
Authentication Header (AH)
....................................................................................
D-4
IKE Security Association
.........................................................................................
D-4
Mode
.................................................................................................................
D-5
Key Management
....................................................................................................
D-6
Understand the Process Before You Begin
...................................................................
D-6
VPN Process Overview
.................................................................................................
D-7
Network Interfaces and Addresses
.........................................................................
D-7
Interface Addressing
.........................................................................................
D-7
Firewalls
...........................................................................................................
D-8
Setting Up a VPN Tunnel Between Gateways
........................................................
D-8
VPNC IKE Security Parameters
..................................................................................
D-10
VPNC IKE Phase I Parameters
.............................................................................
D-10
VPNC IKE Phase II Parameters
............................................................................
D-11