ZyWALL Series Internet Security Gateway
VPN Screens
15-23
Table 15-8 VPN IKE: Advanced
LABEL DESCRIPTION
Enable Replay
Detection
As a VPN setup is processing intensive, the system is vulnerable to Denial of Service
(DoS) attacks The IPSec receiver can detect and reject old or duplicate packets to
protect against replay attacks. Select
YES
from the drop-down menu to enable replay
detection, or select
NO
to disable it.
Local Port Start
"0" is the default and signifies any port. Type a port number from 0 to 65535. Some
of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25,
SMTP; 110, POP3.
Local Port End
Type a port number in this field to define a port range. This port number must be
greater than that specified in the previous field. If
Local Port Start
is left at 0,
Local
Port End
will also remain at 0.
Remote Port Start
Type up to 32 characters to identify this VPN policy. You may use any character,
including spaces, but the ZyWALL drops trailing spaces.
Remote Port End
Enter a port number in this field to define a port range. This port number must be
greater than that specified in the previous field. If
Remote Port Start is
left at 0,
Remote Port End
will also remain at 0.
Phase 1
Negotiation Mode Select
Main
or
Aggressive
from the drop-down list box. Multiple SAs connecting
through a secure gateway must have the same negotiation mode.
Encryption
Algorithm
Select
DES
,
3DES
or
AES
from the drop-down list box.
The ZyWALL and the remote IPSec router generate an encryption key from the
Diffie-Hellman key exchange. The DES encryption algorithm uses a 56-bit key. Triple
DES (
3DES
) is a variation on DES that uses a 168-bit key. As a result,
3DES
is more
secure than
DES
. It also requires more processing power, resulting in increased
latency and decreased throughput.
AES
uses a 128-bit key.
AES
is faster than
3DES
and provides a similar level of security.
Authentication
Algorithm
Select
SHA1
or
MD5
from the drop-down list box.
MD5
(Message Digest 5) and
SHA1
(Secure Hash Algorithm) are hash algorithms used to authenticate packet
data. The
SHA1
algorithm is generally considered stronger than
MD5
, but is slower.
Select
MD5
for minimal security and
SHA-1
for maximum security.
SA Life Time
(seconds)
Define the length of time before an IKE SA automatically renegotiates in this field. It
may range from 60 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to update
the encryption and authentication keys. However, every time the VPN tunnel
renegotiates, all users accessing remote resources are temporarily disconnected.
Summary of Contents for Internet Security Gateway ZyWALL 100
Page 1: ...ZyWALL 10W 30W 50 100 Internet Security Gateway User s Guide Version 3 62 February 2004 ...
Page 8: ......
Page 32: ......
Page 42: ......
Page 60: ......
Page 74: ......
Page 92: ......
Page 102: ......
Page 104: ......
Page 108: ......
Page 124: ...ZyWALL Series Internet Security Gateway 8 16 WAN Screens Figure 8 10 Dial Backup Setup ...
Page 132: ......
Page 134: ......
Page 156: ......
Page 170: ......
Page 218: ......
Page 224: ......
Page 235: ...ZyWALL Series Internet Security Gateway VPN Screens 15 11 Figure 15 5 VPN IKE ...
Page 260: ......
Page 262: ......
Page 282: ...ZyWALL Series Internet Security Gateway 16 20 Certificates Figure 16 9 Trusted CA Details ...
Page 298: ......
Page 300: ......
Page 308: ......
Page 350: ......
Page 351: ...Logs IX Part IX Logs This part provides information and instructions for the logs and reports ...
Page 352: ......
Page 356: ...ZyWALL Series Internet Security Gateway 20 4 Log Screens Figure 20 2 Log Settings ...
Page 364: ......
Page 365: ...Maintenance X Part X Maintenance This part covers the maintenance screens ...
Page 366: ......
Page 378: ......
Page 380: ......
Page 406: ......
Page 420: ......
Page 428: ......
Page 446: ......
Page 466: ......
Page 490: ......
Page 504: ......
Page 524: ......
Page 536: ......
Page 538: ......
Page 554: ......
Page 574: ......
Page 580: ......
Page 586: ......
Page 588: ......
Page 590: ......
Page 592: ......
Page 604: ......
Page 608: ......
Page 610: ......
Page 614: ......
Page 624: ......
Page 634: ......
Page 636: ......
Page 648: ......
Page 654: ......
Page 680: ......
Page 682: ......