EasyManua.ls Logo

ZyXEL Communications eir F1000 - Page 10

ZyXEL Communications eir F1000
359 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10
eir F1000 Modem User’s Guide
Table of Contents
16.2 The Scheduler Rule Screen ..........................................................................................................201
16.2.1 Add/Edit a Schedule ............................................................................................................202
Chapter 17
Certificates ........................................................................................................................................
203
17.1 Overview .......................................................................................................................................203
17.1.1 What You Can Do in this Chapter ........................................................................................203
17.2 What You Need to Know ...............................................................................................................203
17.3 The Local Certificates Screen .......................................................................................................203
17.3.1 Create Certificate Request .................................................................................................204
17.3.2 Load Signed Certificate ......................................................................................................205
17.4 The Trusted CA Screen ................................................................................................................206
17.4.1 View Trusted CA Certificate .................................................................................................208
17.4.2 Import Trusted CA Certificate ..............................................................................................209
Chapter 18
VPN .................................................................................................................................................... 211
18.1 Overview
.......................................................................................................................................
211
18.2 The IPSec VPN General Screen
...................................................................................................
211
18.3 The IPSec VPN Add/Edit Screen ..................................................................................................212
18.4 The IPSec VPN Monitor Screen ....................................................................................................218
18.5 Technical Reference ......................................................................................................................218
18.5.1 IPSec Architecture ...............................................................................................................218
18.5.2 Encapsulation ......................................................................................................................219
18.5.3 IKE Phases .........................................................................................................................220
18.5.4 Negotiation Mode ................................................................................................................221
18.5.5 IPSec and NAT ....................................................................................................................222
18.5.6 VPN, NAT, and NAT Traversal .............................................................................................222
18.5.7 ID Type and Content ............................................................................................................223
18.5.8 Pre-Shared Key ...................................................................................................................224
18.5.9 Diffie-Hellman (DH) Key Groups ..........................................................................................224
Chapter 19
Log .................................................................................................................................................... 225
19.1 Overview .......................................................................................................................................225
19.1.1 What You Can Do in this Chapter ........................................................................................225
19.1.2 What You Need To Know .....................................................................................................225
19.2 The System Log Screen ................................................................................................................226
19.3 The Security Log Screen ...............................................................................................................227
Chapter 20
Traffic Status .................................................................................................................................... 229
20.1 Overview .......................................................................................................................................229

Table of Contents

Related product manuals