
Chapter 3 Wizard Setup
ZyWALL 2WG User’s Guide
96
The following table describes the labels in this screen.
3.7 VPN Wizard Status Summary
This read-only screen shows the status of the current VPN setting. Use the summary table to
check whether what you have configured is correct.
Table 19
VPN Wizard: IPSec Setting
LABEL
DESCRIPTION
Encapsulation Mode
Tunnel
is compatible with NAT,
Transport
is not.
Tunnel mode encapsulates the entire IP packet to transmit it securely. A Tunnel
mode is required for gateway services to provide access to internal systems.
Tunnel mode is fundamentally an IP tunnel with authentication and encryption.
Transport mode is used to protect upper layer protocols and only affects the
data in the IP packet. In Transport mode, the IP packet contains the security
protocol (AH or ESP) located after the original IP header and options, but before
any upper layer protocols contained in the packet (such as TCP and UDP).
IPSec Protocol
Select the security protocols used for an SA.
Both
AH
and
ESP
increase ZyWALL processing requirements and
communications latency (delay).
Encryption Algorithm When
DES
is used for data communications, both sender and receiver must
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (
3DES
) is a variation on DES
that uses a 168-bit key. As a result,
3DES
is more secure than
DES
. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of
AES
uses a 128-bit key.
AES
is faster than
3DES
. Select
NULL
to set up a tunnel without encryption. When you select
NULL
, you do not enter an encryption key.
Authentication
Algorithm
MD5
(Message Digest 5) and
SHA1
(Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The
SHA1
algorithm is generally
considered stronger than
MD5
, but is slower. Select
MD5
for minimal security
and
SHA-1
for maximum security.
SA Life Time
(Seconds)
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward
Secret (PFS)
Perfect Forward Secret (PFS) is disabled (
None
) by default in phase 2 IPSec
SA setup. This allows faster IPSec setup, but is not so secure.
Select
DH1
or
DH2
to enable PFS.
DH1
refers to Diffie-Hellman Group 1 a 768
bit random number.
DH2
refers to Diffie-Hellman Group 2 a 1024 bit (1Kb)
random number (more secure, yet slower).
Back Click
Back
to return to the previous screen.
Next
Click
Next
to continue.
Summary of Contents for ZYWALL 2 WG
Page 2: ......
Page 8: ...Safety Warnings ZyWALL 2WG User s Guide 8 ...
Page 42: ...List of Figures ZyWALL 2WG User s Guide 42 ...
Page 50: ...List of Tables ZyWALL 2WG User s Guide 50 ...
Page 52: ...52 ...
Page 80: ...Chapter 2 Introducing the Web Configurator ZyWALL 2WG User s Guide 80 ...
Page 100: ...Chapter 3 Wizard Setup ZyWALL 2WG User s Guide 100 ...
Page 140: ...Chapter 4 Tutorial ZyWALL 2WG User s Guide 140 ...
Page 146: ...146 ...
Page 158: ...Chapter 6 LAN Screens ZyWALL 2WG User s Guide 158 ...
Page 171: ...Chapter 8 WAN Screens ZyWALL 2WG User s Guide 171 Figure 108 NETWORK WAN General ...
Page 200: ...Chapter 8 WAN Screens ZyWALL 2WG User s Guide 200 ...
Page 238: ...238 ...
Page 300: ...Chapter 13 Content Filtering Reports ZyWALL 2WG User s Guide 300 ...
Page 348: ...Chapter 14 IPSec VPN ZyWALL 2WG User s Guide 348 ...
Page 378: ...Chapter 15 Certificates ZyWALL 2WG User s Guide 378 ...
Page 384: ...384 ...
Page 426: ...Chapter 20 Bandwidth Management ZyWALL 2WG User s Guide 426 ...
Page 479: ...479 PART V Logs and Maintenance Logs Screens 481 Maintenance 511 ...
Page 480: ...480 ...
Page 485: ...Chapter 26 Logs Screens ZyWALL 2WG User s Guide 485 Figure 304 LOGS Log Settings ...
Page 510: ...Chapter 26 Logs Screens ZyWALL 2WG User s Guide 510 ...
Page 530: ...530 ...
Page 558: ...Chapter 30 WAN and Dial Backup Setup ZyWALL 2WG User s Guide 558 ...
Page 564: ...Chapter 31 LAN Setup ZyWALL 2WG User s Guide 564 ...
Page 570: ...Chapter 32 Internet Access ZyWALL 2WG User s Guide 570 ...
Page 574: ...Chapter 33 DMZ Setup ZyWALL 2WG User s Guide 574 ...
Page 578: ...Chapter 34 Route Setup ZyWALL 2WG User s Guide 578 ...
Page 582: ...Chapter 35 Wireless Setup ZyWALL 2WG User s Guide 582 ...
Page 594: ...Chapter 37 IP Static Route Setup ZyWALL 2WG User s Guide 594 ...
Page 614: ...Chapter 38 Network Address Translation NAT ZyWALL 2WG User s Guide 614 ...
Page 632: ...Chapter 40 Filter Configuration ZyWALL 2WG User s Guide 632 ...
Page 668: ...Chapter 44 System Maintenance Menus 8 to 10 ZyWALL 2WG User s Guide 668 ...
Page 672: ...Chapter 45 Remote Management ZyWALL 2WG User s Guide 672 ...
Page 680: ...Chapter 46 IP Policy Routing ZyWALL 2WG User s Guide 680 ...
Page 686: ...686 ...
Page 692: ...Chapter 48 Troubleshooting ZyWALL 2WG User s Guide 692 ...
Page 702: ...Chapter 49 Product Specifications ZyWALL 2WG User s Guide 702 ...
Page 704: ...704 ...
Page 712: ...Appendix A Pop up Windows JavaScripts and Java Permissions ZyWALL 2WG User s Guide 712 ...
Page 740: ...Appendix D Common Services ZyWALL 2WG User s Guide 740 ...
Page 768: ...Appendix G Legal Information ZyWALL 2WG User s Guide 768 ...
Page 774: ...Appendix H Customer Support ZyWALL 2WG User s Guide 774 ...