Operation Manual
Table of Contents
eircom F1000 Modem User’s Guide
10
16.2 The Scheduler Rule Screen ..........................................................................................................201
16.2.1 Add/Edit a Schedule ............................................................................................................202
Chapter 17
Certificates ........................................................................................................................................203
17.1 Overview .......................................................................................................................................203
17.1.1 What You Can Do in this Chapter ........................................................................................203
17.2 What You Need to Know ...............................................................................................................203
17.3 The Local Certificates Screen .......................................................................................................203
17.3.1 Create Certificate Request .................................................................................................204
17.3.2 Load Signed Certificate ......................................................................................................205
17.4 The Trusted CA Screen ................................................................................................................206
17.4.1 View Trusted CA Certificate .................................................................................................208
17.4.2 Import Trusted CA Certificate ..............................................................................................209
Chapter 18
VPN ....................................................................................................................................................211
18.1 Overview .......................................................................................................................................211
18.2 The IPSec VPN General Screen ...................................................................................................211
18.3 The IPSec VPN Add/Edit Screen ..................................................................................................212
18.4 The IPSec VPN Monitor Screen ....................................................................................................218
18.5 Technical Reference ......................................................................................................................218
18.5.1 IPSec Architecture ...............................................................................................................218
18.5.2 Encapsulation ......................................................................................................................219
18.5.3 IKE Phases .........................................................................................................................220
18.5.4 Negotiation Mode ................................................................................................................221
18.5.5 IPSec and NAT ....................................................................................................................222
18.5.6 VPN, NAT, and NAT Traversal .............................................................................................222
18.5.7 ID Type and Content ............................................................................................................223
18.5.8 Pre-Shared Key ...................................................................................................................224
18.5.9 Diffie-Hellman (DH) Key Groups ..........................................................................................224
Chapter 19
Log ....................................................................................................................................................225
19.1 Overview .......................................................................................................................................225
19.1.1 What You Can Do in this Chapter ........................................................................................225
19.1.2 What You Need To Know .....................................................................................................225
19.2 The System Log Screen ................................................................................................................226
19.3 The Security Log Screen ...............................................................................................................227
Chapter 20
Traffic Status ....................................................................................................................................229
20.1 Overview .......................................................................................................................................229