Chapter 16 VPN
ADSL Series User’s Guide
216
16.6.5 IKE Phases
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication)
and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses
that SA to negotiate SAs for IPSec.
Figure 113
Two Phases to Set Up the IPSec SA
In phase 1 you must:
• Choose a negotiation mode.
• Authenticate the connection by entering a pre-shared key.
• Choose an encryption algorithm.
• Choose an authentication algorithm.
• Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2).
• Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should stay up
before it times out. An IKE SA times out when the IKE SA lifetime period expires. If an IKE SA
times out when an IPSec SA is already established, the IPSec SA stays connected.
In phase 2 you must:
• Choose which protocol to use (ESP or AH) for the IKE key exchange.
• Choose an encryption algorithm.
• Choose an authentication algorithm
• Choose whether to enable Perfect Forward Secrecy (PFS) using Diffie-Hellman public-key
cryptography – see
. Select None (the default) to disable PFS.
• Choose Tunnel mode or Transport mode.
• Set the IPSec SA lifetime. This field allows you to determine how long the IPSec SA should stay
up before it times out. The ZyXEL Device automatically renegotiates the IPSec SA if there is
traffic when the IPSec SA lifetime period expires. The ZyXEL Device also automatically
renegotiates the IPSec SA if both IPSec routers have keep alive enabled, even if there is no
traffic. If an IPSec SA times out, then the IPSec router must renegotiate the SA the next time
someone attempts to send traffic.
Summary of Contents for P-660HN-F1
Page 2: ...Videos ADSL Series User s Guide 2 Videos File Sharing Video Example 55 QoS Video Example 76...
Page 6: ...Document Conventions ADSL Series User s Guide 6 Server Firewall Router Switch...
Page 8: ...Safety Warnings ADSL Series User s Guide 8...
Page 10: ...Contents Overview ADSL Series User s Guide 10...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 26: ...Chapter 1 Introduction ADSL Series User s Guide 26...
Page 40: ...Chapter 2 Introducing the Web Configurator ADSL Series User s Guide 40...
Page 80: ...Chapter 3 Tutorials ADSL Series User s Guide 80...
Page 81: ...81 PART II Technical Reference...
Page 82: ...82...
Page 130: ...Chapter 6 Wireless ADSL Series User s Guide 130...
Page 160: ...Chapter 8 Routing ADSL Series User s Guide 160...
Page 164: ...Chapter 9 DNS Route ADSL Series User s Guide 164...
Page 182: ...Chapter 11 Network Address Translation NAT ADSL Series User s Guide 182...
Page 190: ...Chapter 13 Firewall ADSL Series User s Guide 190...
Page 202: ...Chapter 15 Certificates ADSL Series User s Guide 202...
Page 222: ...Chapter 16 VPN ADSL Series User s Guide 222...
Page 226: ...Chapter 17 System Monitor ADSL Series User s Guide 226...
Page 228: ...Chapter 18 User Account ADSL Series User s Guide 228...
Page 242: ...Chapter 24 Backup Restore ADSL Series User s Guide 242...
Page 246: ...Chapter 25 Diagnostic ADSL Series User s Guide 246...
Page 254: ...Chapter 26 Troubleshooting ADSL Series User s Guide 254...
Page 262: ...Chapter 27 Product Specifications ADSL Series User s Guide 262...
Page 302: ...Appendix B Setting Up Your Computer s IP Address ADSL Series User s Guide 302...
Page 310: ...Appendix C Pop up Windows Java Script and Java Permissions ADSL Series User s Guide 310...
Page 334: ...Appendix E Common Services ADSL Series User s Guide 334...
Page 355: ...Appendix F Open Software Announcements ADSL Series User s Guide 355...
Page 356: ...Appendix F Open Software Announcements ADSL Series User s Guide 356...
Page 360: ...Appendix G Legal Information ADSL Series User s Guide 360...