
Chapter 3 Wizard Setup
ZyWALL 2 Plus User’s Guide
83
The following table describes the labels in this screen.
3.6 VPN Wizard IPSec Setting (IKE Phase 2)
Use this screen to specify the authentication, encryption and other settings needed to negotiate
a phase 2 IPSec SA.
Table 17
VPN Wizard: IKE Tunnel Setting
LABEL
DESCRIPTION
Negotiation Mode
Select
Main Mode
for identity protection. Select
Aggressive Mode
to allow
more incoming connections from dynamic IP addresses to use separate
passwords.
Note: Multiple SAs (security associations) connecting through a
secure gateway must have the same negotiation mode.
Encryption
Algorithm
When
DES
is used for data communications, both sender and receiver must
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The
DES
encryption algorithm uses a 56-bit key. Triple DES (
3DES
) is a variation on
DES
that uses a 168-bit key. As a result,
3DES
is more secure than
DES
. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of
AES
uses a 128-bit key.
AES
is faster than
3DES
.
Authentication
Algorithm
MD5
(Message Digest 5) and
SHA1
(Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The
SHA1
algorithm is generally
considered stronger than
MD5
, but is slower. Select
MD5
for minimal security
and
SHA-1
for maximum security.
Key Group
You must choose a key group for phase 1 IKE setup.
DH1
(default) refers to
Diffie-Hellman Group 1 a 768 bit random number.
DH2
refers to Diffie-Hellman
Group 2 a 1024 bit (1Kb) random number.
SA Life Time
(Seconds)
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Pre-Shared Key
Type your pre-shared key in this field. A pre-shared key identifies a
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate
with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62
hexadecimal ("0-9", "A-F") characters. You must precede a hexadecimal key
with a "0x (zero x), which is not counted as part of the 16 to 62 character range
for the key. For example, in "0x0123456789ABCDEF", 0x denotes that the key
is hexadecimal and 0123456789ABCDEF is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a PYLD_MALFORMED (payload malformed) packet if the same pre-
shared key is not used on both ends.
Back Click
Back
to return to the previous screen.
Next
Click
Next
to continue.
Summary of Contents for ADSL 2+ Security Gateway
Page 2: ......
Page 25: ...Table of Contents ZyWALL 2 Plus User s Guide 25 Index 679 ...
Page 26: ...Table of Contents ZyWALL 2 Plus User s Guide 26 ...
Page 46: ...46 ...
Page 88: ...Chapter 3 Wizard Setup ZyWALL 2 Plus User s Guide 88 ...
Page 132: ...132 ...
Page 144: ...Chapter 6 LAN Screens ZyWALL 2 Plus User s Guide 144 ...
Page 180: ...Chapter 9 DMZ Screens ZyWALL 2 Plus User s Guide 180 ...
Page 190: ...190 ...
Page 222: ...Chapter 11 Firewall ZyWALL 2 Plus User s Guide 222 ...
Page 252: ...Chapter 13 Content Filtering Reports ZyWALL 2 Plus User s Guide 252 ...
Page 328: ...Chapter 16 Authentication Server ZyWALL 2 Plus User s Guide 328 ...
Page 330: ...330 ...
Page 346: ...Chapter 17 Network Address Translation NAT ZyWALL 2 Plus User s Guide 346 ...
Page 350: ...Chapter 18 Static Route ZyWALL 2 Plus User s Guide 350 ...
Page 398: ...Chapter 21 Remote Management ZyWALL 2 Plus User s Guide 398 ...
Page 416: ...Chapter 24 ALG Screen ZyWALL 2 Plus User s Guide 416 ...
Page 417: ...417 PART V Logs and Maintenance Logs Screens 419 Maintenance 447 ...
Page 418: ...418 ...
Page 423: ...Chapter 25 Logs Screens ZyWALL 2 Plus User s Guide 423 Figure 274 LOGS Log Settings ...
Page 466: ...466 ...
Page 474: ...Chapter 27 Introducing the SMT ZyWALL 2 Plus User s Guide 474 ...
Page 496: ...Chapter 30 LAN Setup ZyWALL 2 Plus User s Guide 496 ...
Page 504: ...Chapter 32 DMZ Setup ZyWALL 2 Plus User s Guide 504 ...
Page 508: ...Chapter 33 Wireless Setup ZyWALL 2 Plus User s Guide 508 ...
Page 556: ...Chapter 38 Filter Configuration ZyWALL 2 Plus User s Guide 556 ...
Page 570: ...Chapter 40 System Information Diagnosis ZyWALL 2 Plus User s Guide 570 ...
Page 586: ...Chapter 41 Firmware and Configuration File Maintenance ZyWALL 2 Plus User s Guide 586 ...
Page 594: ...Chapter 42 System Maintenance Menus 8 to 10 ZyWALL 2 Plus User s Guide 594 ...
Page 598: ...Chapter 43 Remote Management ZyWALL 2 Plus User s Guide 598 ...
Page 604: ...604 ...
Page 612: ...Chapter 45 Troubleshooting ZyWALL 2 Plus User s Guide 612 ...
Page 620: ...620 ...
Page 644: ...Appendix B Pop up Windows JavaScripts and Java Permissions ZyWALL 2 Plus User s Guide 644 ...
Page 668: ...Appendix E Importing Certificates ZyWALL 2 Plus User s Guide 668 ...
Page 672: ...Appendix F Legal Information ZyWALL 2 Plus User s Guide 672 ...
Page 678: ...Appendix G Customer Support ZyWALL 2 Plus User s Guide 678 ...