![ZyXEL Communications ZyXEL ZyWALL P1 User Manual Download Page 65](http://html1.mh-extra.com/html/zyxel-communications/zyxel-zywall-p1/zyxel-zywall-p1_user-manual_944436065.webp)
ZyWALL P1 User’s Guide
64
Chapter 3 Wizard Setup
3.3.7.4 Perfect Forward Secrecy (PFS)
Enabling PFS means that the key is transient. The key is thrown away and replaced by a brand
new key using a new Diffie-Hellman exchange for each new IPSec SA setup. With PFS
enabled, if one key is compromised, previous and subsequent keys are not compromised,
because subsequent keys are not derived from previous keys. The (time-consuming) Diffie-
Hellman exchange is the trade-off for this extra security.
This may be unnecessary for data that does not require such security, so PFS is disabled
(
None
) by default in the ZyWALL. Disabling PFS means new authentication and encryption
keys are derived from the same root secret (which may have security implications in the long
run) but allows faster SA setup (by bypassing the Diffie-Hellman key exchange).
3.4 IPSec Algorithms
The
ESP
and
AH
protocols are necessary to create a Security Association (SA), the
foundation of an IPSec VPN. An SA is built from the authentication provided by the
AH
and
ESP
protocols. The primary function of key management is to establish and maintain the SA
between systems. Once the SA is established, the transport of data may commence.
3.4.1 AH (Authentication Header) Protocol
AH
protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not for confidentiality, for which the
ESP
was designed.
In applications where confidentiality is not required or not sanctioned by government
encryption restrictions, an
AH
can be employed to ensure integrity. This type of
implementation does not protect the information from dissemination but will allow for
verification of the integrity of the information and authentication of the originator.
3.4.2 ESP (Encapsulating Security Payload) Protocol
The
ESP
protocol (RFC 2406) provides encryption as well as some of the services offered by
AH
.
ESP
authenticating properties are limited compared to the
AH
due to the non-inclusion of
the IP header information during the authentication process. However,
ESP
is sufficient if
only the upper layer protocols need to be authenticated.
Summary of Contents for ZyXEL ZyWALL P1
Page 1: ...ZyWALL P1 Internet Security Appliance User s Guide Version 3 64 8 2005...
Page 9: ...ZyWALL P1 User s Guide 8 Customer Support...
Page 25: ...ZyWALL P1 User s Guide 24 List of Figures...
Page 39: ...ZyWALL P1 User s Guide 38 Chapter 1 Getting to Know Your ZyWALL...
Page 51: ...ZyWALL P1 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Page 72: ...ZyWALL P1 User s Guide Chapter 3 Wizard Setup 71 Figure 22 VPN Wizard Complete...
Page 73: ...ZyWALL P1 User s Guide 72 Chapter 3 Wizard Setup...
Page 91: ...ZyWALL P1 User s Guide 90 Chapter 5 WAN Screens...
Page 129: ...ZyWALL P1 User s Guide 128 Chapter 8 Introduction to IPSec...
Page 151: ...ZyWALL P1 User s Guide 150 Chapter 9 VPN Screens...
Page 191: ...ZyWALL P1 User s Guide 190 Chapter 12 Static Route...
Page 215: ...ZyWALL P1 User s Guide 214 Chapter 13 Remote Management...
Page 248: ...ZyWALL P1 User s Guide Chapter 16 Maintenance 247 Figure 134 Restart Screen...
Page 249: ...ZyWALL P1 User s Guide 248 Chapter 16 Maintenance...
Page 269: ...ZyWALL P1 User s Guide 268 Chapter 18 Troubleshooting...
Page 289: ...ZyWALL P1 User s Guide 288 Appendix B IP Subnetting...
Page 295: ...ZyWALL P1 User s Guide 294 Appendix D PPTP...
Page 299: ...ZyWALL P1 User s Guide 298 Appendix E Triangle Route...
Page 329: ...ZyWALL P1 User s Guide 328 Appendix H Importing Certificates...
Page 331: ...ZyWALL P1 User s Guide 330 Appendix I Command Interpreter...
Page 337: ...ZyWALL P1 User s Guide 336 Appendix J Firewall Commands...
Page 341: ...ZyWALL P1 User s Guide 340 Appendix K NetBIOS Filter Commands...
Page 347: ...ZyWALL P1 User s Guide 346 Appendix M Brute Force Password Guessing Protection...