ZyWALL Series Internet Security Gateway
VPN/IPSec Setup
40-13
Table 40-3
Menu 27.1.1.1: IKE Setup
FIELD DESCRIPTION
EXAMPLE
Phase 1
Negotiation
Mode
Press [SPACE BAR] to choose from
Main
or
Aggressive
and then press
[ENTER]. See earlier for a discussion of these modes. Multiple SAs
connecting through a secure gateway must have the same negotiation mode.
Main
Authentication
Method
Select
Pre-Shared Key
to use a pre-shared key to identify the ZyWALL and
the remote IPSec router. A pre-shared key identifies a communicating party
during a phase 1 IKE negotiation. It is called "pre-shared" because you have
to share it with another party before you can communicate with them over a
secure connection.
Select
Certificate
to identify the ZyWALL and the remote IPSec router by
certificates.
Pre-Shared
Key
ZyWALL gateways authenticate an IKE VPN session by matching pre-shared
keys. Pre-shared keys are best for small networks with fewer than ten nodes.
Enter your pre-shared key here. Enter up to 31 characters. Any character may
be used, including spaces, but trailing spaces are truncated.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a “PYLD_MALFORMED” (payload malformed) packet if the same pre-
shared key is not used on both ends.
Certificate
Select the certificate to use for this VPN tunnel. You must have certificates
already configured in the
My Certificates
screen (see the web configurator
Certificates
part for details).
Encryption
Algorithm
The ZyWALL and the remote IPSec router generate an encryption key from
the Diffie-Hellman key exchange. ZyWALL
DES
encryption algorithm uses a
56-bit key.
Triple DES (
3DES
), is a variation on DES that uses a 168-bit key. As a result,
3DES
is more secure than
DES
. It also requires more processing power,
resulting in slightly increased latency and decreased throughput.
This implementation of AES uses a 128-bit key.
AES
is faster than
3DES
.
Press [SPACE BAR] to choose from
DES
,
3DES
or
AES
and then press
[ENTER].
DES
Authentication
Algorithm
MD5
(Message Digest 5) and
SHA1
(Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The
SHA1
algorithm is generally
considered stronger than
MD5
, but is slightly slower.
Press [SPACE BAR] to choose from
SHA1
or
MD5
and then press [ENTER].
SHA1
Summary of Contents for Internet Security Gateway ZyWALL 100
Page 1: ...ZyWALL 10W 30W 50 100 Internet Security Gateway User s Guide Version 3 62 February 2004 ...
Page 8: ......
Page 32: ......
Page 42: ......
Page 60: ......
Page 74: ......
Page 92: ......
Page 102: ......
Page 104: ......
Page 108: ......
Page 124: ...ZyWALL Series Internet Security Gateway 8 16 WAN Screens Figure 8 10 Dial Backup Setup ...
Page 132: ......
Page 134: ......
Page 156: ......
Page 170: ......
Page 218: ......
Page 224: ......
Page 235: ...ZyWALL Series Internet Security Gateway VPN Screens 15 11 Figure 15 5 VPN IKE ...
Page 260: ......
Page 262: ......
Page 282: ...ZyWALL Series Internet Security Gateway 16 20 Certificates Figure 16 9 Trusted CA Details ...
Page 298: ......
Page 300: ......
Page 308: ......
Page 350: ......
Page 351: ...Logs IX Part IX Logs This part provides information and instructions for the logs and reports ...
Page 352: ......
Page 356: ...ZyWALL Series Internet Security Gateway 20 4 Log Screens Figure 20 2 Log Settings ...
Page 364: ......
Page 365: ...Maintenance X Part X Maintenance This part covers the maintenance screens ...
Page 366: ......
Page 378: ......
Page 380: ......
Page 406: ......
Page 420: ......
Page 428: ......
Page 446: ......
Page 466: ......
Page 490: ......
Page 504: ......
Page 524: ......
Page 536: ......
Page 538: ......
Page 554: ......
Page 574: ......
Page 580: ......
Page 586: ......
Page 588: ......
Page 590: ......
Page 592: ......
Page 604: ......
Page 608: ......
Page 610: ......
Page 614: ......
Page 624: ......
Page 634: ......
Page 636: ......
Page 648: ......
Page 654: ......
Page 680: ......
Page 682: ......