Chapter 4 Wizard Setup
ZyWALL USG 2000 User’s Guide
79
Encryption
Algorithm
When DES is used for data communications, both sender and receiver
must know the same secret key, which can be used to encrypt and
decrypt the message or to generate and verify a message authentication
code. The DES encryption algorithm uses a 56-bit key. Triple DES
(3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES
is more secure than DES. It also requires more processing power,
resulting in increased latency and decreased throughput. AES128 uses
a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key and
AES256 uses a 256-bit key. Select Null to have no encryption.
Authentication
Algorithm
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is
generally considered stronger than MD5, but is slower. Select MD5 for
minimal security and SHA1 for maximum security.
Key Group
You must choose a key group for phase 1 IKE setup. DH1 (default)
refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers
to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers
to Diffie-Hellman Group 5 a 1536 bit random number.
SA Life Time
(Seconds)
Define the length of time before an IKE SA automatically renegotiates in
this field. The minimum value is 60 seconds.
A short SA Life Time increases security by forcing the two VPN gateways
to update the encryption and authentication keys. However, every time
the VPN tunnel renegotiates, all users accessing remote resources are
temporarily disconnected.
NAT Traversal
Select this check box to enable NAT traversal. NAT traversal allows you
to set up a VPN connection when there are NAT routers between the two
IPSec routers.
Note: The remote IPSec router must also have NAT traversal
enabled. See
Dead Peer
Detection
(DPD)
Select this check box if you want the ZyWALL to make sure the remote
IPSec router is there before it transmits data through the IKE SA. If there
has been no traffic for at least 15 seconds, the ZyWALL sends a message
to the remote IPSec server. If the remote IPSec server responds, the
ZyWALL transmits the data. If the remote IPSec server does not
respond, the ZyWALL shuts down the IKE SA.
Authentication
Method
Pre-Shared
Key
Type your pre-shared key in this field. A pre-shared key identifies a
communicating party during a phase 1 IKE negotiation. It is called "pre-
shared" because you have to share it with another party before you can
communicate with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs of
hexadecimal ("0-9", "A-F") characters. Precede a hexadecimal key with
“0x”.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a PYLD_MALFORMED (payload malformed) packet if the same
pre-shared key is not used on both ends.
Table 17
VPN Advanced Wizard: Step 3 (continued)
LABEL
DESCRIPTION
Summary of Contents for ZyXEL ZyWALL USG-1000
Page 2: ......
Page 30: ...30 ...
Page 58: ...Chapter 3 Web Configurator ZyWALL USG 2000 User s Guide 58 ...
Page 84: ...Chapter 4 Wizard Setup ZyWALL USG 2000 User s Guide 84 ...
Page 136: ...Chapter 6 Tutorials ZyWALL USG 2000 User s Guide 136 ...
Page 166: ...Chapter 9 Signature Update ZyWALL USG 2000 User s Guide 166 ...
Page 168: ...168 ...
Page 234: ...Chapter 11 Trunks ZyWALL USG 2000 User s Guide 234 ...
Page 248: ...Chapter 12 Policy and Static Routes ZyWALL USG 2000 User s Guide 248 ...
Page 272: ...Chapter 15 DDNS ZyWALL USG 2000 User s Guide 272 ...
Page 287: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 287 ...
Page 288: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 288 ...
Page 307: ...307 PART III Firewall Firewall 309 ...
Page 308: ...308 ...
Page 326: ...Chapter 20 Firewall ZyWALL USG 2000 User s Guide 326 ...
Page 328: ...328 ...
Page 370: ...Chapter 21 IPSec VPN ZyWALL USG 2000 User s Guide 370 ...
Page 392: ...Chapter 23 SSL User Screens ZyWALL USG 2000 User s Guide 392 ...
Page 394: ...Chapter 24 SSL User Application Screens ZyWALL USG 2000 User s Guide 394 ...
Page 402: ...Chapter 25 SSL User File Sharing ZyWALL USG 2000 User s Guide 402 ...
Page 412: ...Chapter 27 L2TP VPN ZyWALL USG 2000 User s Guide 412 ...
Page 440: ...Chapter 28 L2TP VPN Example ZyWALL USG 2000 User s Guide 440 ...
Page 441: ...441 PART V Application Patrol Application Patrol 443 ...
Page 442: ...442 ...
Page 470: ...470 ...
Page 531: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 531 Figure 371 Profiles Protocol Anomaly ...
Page 540: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 540 ...
Page 566: ...Chapter 33 Content Filtering ZyWALL USG 2000 User s Guide 566 ...
Page 574: ...Chapter 34 Content Filter Reports ZyWALL USG 2000 User s Guide 574 ...
Page 593: ...593 PART VII Device HA Device HA 595 ...
Page 594: ...594 ...
Page 614: ...614 ...
Page 636: ...Chapter 38 Addresses ZyWALL USG 2000 User s Guide 636 ...
Page 660: ...Chapter 41 AAA Server ZyWALL USG 2000 User s Guide 660 ...
Page 686: ...Chapter 43 Certificates ZyWALL USG 2000 User s Guide 686 ...
Page 698: ...Chapter 45 SSL Application ZyWALL USG 2000 User s Guide 698 ...
Page 699: ...699 PART IX System System 701 ...
Page 700: ...700 ...
Page 750: ...750 ...
Page 776: ...Chapter 48 Logs ZyWALL USG 2000 User s Guide 776 ...
Page 794: ...Chapter 49 Reports ZyWALL USG 2000 User s Guide 794 ...
Page 796: ...Chapter 50 Diagnostics ZyWALL USG 2000 User s Guide 796 ...
Page 798: ...Chapter 51 Reboot ZyWALL USG 2000 User s Guide 798 ...
Page 812: ...Chapter 53 Product Specifications ZyWALL USG 2000 User s Guide 812 ...
Page 814: ...814 ...
Page 874: ...Appendix A Log Descriptions ZyWALL USG 2000 User s Guide 874 ...
Page 956: ...Appendix E Open Software Announcements ZyWALL USG 2000 User s Guide 956 ...
Page 960: ...Appendix F Legal Information ZyWALL USG 2000 User s Guide 960 ...