Chapter 14 IPSec VPN
ZyWALL 2 Plus User’s Guide
260
• Instead of using the pre-shared key, the ZyWALL and remote IPSec router check each
other’s certificates.
• The local ID type and ID content come from the certificate. On the ZyWALL, you simply
select which certificate to use.
• If you set the peer ID type to
Any
, the ZyWALL authenticates the remote IPSec router
using the trusted certificates and trusted CAs you have set up. Alternatively, if you want to
use a specific certificate to authenticate the remote IPSec router, you can use the
information in the certificate to specify the peer ID type and ID content.
"
You must set up the certificates for the ZyWALL and remote IPSec router
before you can use certificates in IKE SA. See
more information about certificates.
14.3.1.3 Extended Authentication
Extended authentication is often used when multiple IPSec routers use the same VPN tunnel to
connect to a single IPSec router. For example, this might be used with telecommuters.
Extended authentication occurs right after the authentication described in
In extended authentication, one of the routers (the ZyWALL or the remote IPSec router)
provides a user name and password to the other router, which uses a local user database and/or
an external server to verify the user name and password. If the user name or password is
wrong, the routers do not establish an IKE SA.
You can set up the ZyWALL to provide a user name and password to the remote IPSec router,
or you can set up the ZyWALL to check a user name and password that is provided by the
remote IPSec router.
14.3.1.4 Negotiation Mode
There are two negotiation modes: main mode and aggressive mode. Main mode provides
better security, while aggressive mode is faster.
Main mode takes six steps to establish an IKE SA.
Steps 1-2: The ZyWALL sends its proposals to the remote IPSec router. The remote IPSec
router selects an acceptable proposal and sends it back to the ZyWALL.
Steps 3-4: The ZyWALL and the remote IPSec router participate in a Diffie-Hellman key
exchange, based on the accepted DH key group, to establish a shared secret.
Steps 5-6: Finally, the ZyWALL and the remote IPSec router generate an encryption key from
the shared secret, encrypt their identities, and exchange their encrypted identity information
for authentication.
In contrast, aggressive
mode only takes three steps to establish an IKE SA.
Step 1: The ZyWALL sends its proposals to the remote IPSec router. It also starts the Diffie-
Hellman key exchange and sends its (unencrypted) identity to the remote IPSec router for
authentication.
Summary of Contents for ADSL 2+ Security Gateway
Page 2: ......
Page 25: ...Table of Contents ZyWALL 2 Plus User s Guide 25 Index 679 ...
Page 26: ...Table of Contents ZyWALL 2 Plus User s Guide 26 ...
Page 46: ...46 ...
Page 88: ...Chapter 3 Wizard Setup ZyWALL 2 Plus User s Guide 88 ...
Page 132: ...132 ...
Page 144: ...Chapter 6 LAN Screens ZyWALL 2 Plus User s Guide 144 ...
Page 180: ...Chapter 9 DMZ Screens ZyWALL 2 Plus User s Guide 180 ...
Page 190: ...190 ...
Page 222: ...Chapter 11 Firewall ZyWALL 2 Plus User s Guide 222 ...
Page 252: ...Chapter 13 Content Filtering Reports ZyWALL 2 Plus User s Guide 252 ...
Page 328: ...Chapter 16 Authentication Server ZyWALL 2 Plus User s Guide 328 ...
Page 330: ...330 ...
Page 346: ...Chapter 17 Network Address Translation NAT ZyWALL 2 Plus User s Guide 346 ...
Page 350: ...Chapter 18 Static Route ZyWALL 2 Plus User s Guide 350 ...
Page 398: ...Chapter 21 Remote Management ZyWALL 2 Plus User s Guide 398 ...
Page 416: ...Chapter 24 ALG Screen ZyWALL 2 Plus User s Guide 416 ...
Page 417: ...417 PART V Logs and Maintenance Logs Screens 419 Maintenance 447 ...
Page 418: ...418 ...
Page 423: ...Chapter 25 Logs Screens ZyWALL 2 Plus User s Guide 423 Figure 274 LOGS Log Settings ...
Page 466: ...466 ...
Page 474: ...Chapter 27 Introducing the SMT ZyWALL 2 Plus User s Guide 474 ...
Page 496: ...Chapter 30 LAN Setup ZyWALL 2 Plus User s Guide 496 ...
Page 504: ...Chapter 32 DMZ Setup ZyWALL 2 Plus User s Guide 504 ...
Page 508: ...Chapter 33 Wireless Setup ZyWALL 2 Plus User s Guide 508 ...
Page 556: ...Chapter 38 Filter Configuration ZyWALL 2 Plus User s Guide 556 ...
Page 570: ...Chapter 40 System Information Diagnosis ZyWALL 2 Plus User s Guide 570 ...
Page 586: ...Chapter 41 Firmware and Configuration File Maintenance ZyWALL 2 Plus User s Guide 586 ...
Page 594: ...Chapter 42 System Maintenance Menus 8 to 10 ZyWALL 2 Plus User s Guide 594 ...
Page 598: ...Chapter 43 Remote Management ZyWALL 2 Plus User s Guide 598 ...
Page 604: ...604 ...
Page 612: ...Chapter 45 Troubleshooting ZyWALL 2 Plus User s Guide 612 ...
Page 620: ...620 ...
Page 644: ...Appendix B Pop up Windows JavaScripts and Java Permissions ZyWALL 2 Plus User s Guide 644 ...
Page 668: ...Appendix E Importing Certificates ZyWALL 2 Plus User s Guide 668 ...
Page 672: ...Appendix F Legal Information ZyWALL 2 Plus User s Guide 672 ...
Page 678: ...Appendix G Customer Support ZyWALL 2 Plus User s Guide 678 ...