Chapter 16 VPN
ADSL Series User’s Guide
211
Authentication
Algorithm
Select MD5, SHA1, SHA2-256 or SHA2-512 from the drop-down list box. MD5
(Message Digest 5) and SHA1 (Secure Hash Algorithm) and SHA2 are hash algorithms
used to authenticate packet data. The SHA1 algorithm is generally considered stronger
than MD5, but is slower. Select MD5 for minimal security and SHA-1 for more
security. SHA2-256 or SHA2-512 are part of the SHA2 set of cryptographic functions
and they are considered even more secure than MD5 and SHA1.
DH
You must choose a key group for phase 1 setup. DH2 refers to Diffie-Hellman Group 2,
a 1024-bit random number. DH5 refers to Diffie-Hellman Group5, a 1536-bit random
number, and DH14 refers to Diffie-Hellman Group 14, providing 2048 bits of key
strength.
SA Life Time
(Seconds)
Define the length of time before an IPSec SA automatically renegotiates in this field. It
may range from 60 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates,
all users accessing remote resources are temporarily disconnected.
Phase 2
Encryption
Algorithm
Select 3DES, AES-128 or AES-256 from the drop-down list box.
When you use one of these encryption algorithms for data communications, both the
sending device and the receiving device must use the same secret key, which can be
used to encrypt and decrypt the message or to generate and verify a message
authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES
(3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure
than DES. It also requires more processing power, resulting in increased latency and
decreased throughput.
This implementation of AES uses a 128-bit key and a 256-bit key. AES is faster than
3DES.
Authentication
Algorithm
Select MD5, SHA1, SHA2-256 or SHA2-512 from the drop-down list box. MD5
(Message Digest 5) and SHA1 (Secure Hash Algorithm) and SHA2 are hash algorithms
used to authenticate packet data. The SHA1 algorithm is generally considered stronger
than MD5, but is slower. Select MD5 for minimal security and SHA-1 for more
security. SHA2-256 or SHA2-512 are part of the SHA2 set of cryptographic functions
and they are considered even more secure than MD5 and SHA1.
SA Life Time
(Seconds)
Define the length of time before an IKE SA automatically renegotiates in this field. It
may range from 60 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates,
all users accessing remote resources are temporarily disconnected.
Perfect Forward
Secrecy (PFS)
Perfect Forward Secrecy (PFS) is disabled (NONE) by default in phase 2 IPSec SA
setup. This allows faster IPSec setup, but is not so secure. Choose DH2, DH5 or DH14
from the drop-down list box to enable PFS. DH2 refers to Diffie-Hellman Group 2, a
1024-bit random number. DH5 refers to Diffie-Hellman Group5, a 1536-bit random
number, and DH14 refers to Diffie-Hellman Group 14, providing 2048 bits of key
strength.
DPD Active
Select DPD (Dead Peer Protection) if you want the ZyXEL Device to make sure the
remote IPSec router is there before it transmits data. The remote IPSec router must
support DPD. If there has been no traffic for at least 15 seconds, the ZyXEL Device
sends a message to the remote IPSec router. If the remote IPSec router responds, the
ZyXEL Device transmits the data. If the remote IPSec router does not respond, the
ZyXEL Device shuts down the SA.
Apply
Click Apply to save your changes back to the ZyXEL Device and return to the VPN
screen.
Back
Click Back to return to the previous screen.
Table 64
Security > VPN > Setup > Edit > Advanced Setup (continued)
LABEL
DESCRIPTION
Содержание P-660HN-F1
Страница 2: ...Videos ADSL Series User s Guide 2 Videos File Sharing Video Example 55 QoS Video Example 76...
Страница 6: ...Document Conventions ADSL Series User s Guide 6 Server Firewall Router Switch...
Страница 8: ...Safety Warnings ADSL Series User s Guide 8...
Страница 10: ...Contents Overview ADSL Series User s Guide 10...
Страница 19: ...19 PART I User s Guide...
Страница 20: ...20...
Страница 26: ...Chapter 1 Introduction ADSL Series User s Guide 26...
Страница 40: ...Chapter 2 Introducing the Web Configurator ADSL Series User s Guide 40...
Страница 80: ...Chapter 3 Tutorials ADSL Series User s Guide 80...
Страница 81: ...81 PART II Technical Reference...
Страница 82: ...82...
Страница 130: ...Chapter 6 Wireless ADSL Series User s Guide 130...
Страница 160: ...Chapter 8 Routing ADSL Series User s Guide 160...
Страница 164: ...Chapter 9 DNS Route ADSL Series User s Guide 164...
Страница 182: ...Chapter 11 Network Address Translation NAT ADSL Series User s Guide 182...
Страница 190: ...Chapter 13 Firewall ADSL Series User s Guide 190...
Страница 202: ...Chapter 15 Certificates ADSL Series User s Guide 202...
Страница 222: ...Chapter 16 VPN ADSL Series User s Guide 222...
Страница 226: ...Chapter 17 System Monitor ADSL Series User s Guide 226...
Страница 228: ...Chapter 18 User Account ADSL Series User s Guide 228...
Страница 242: ...Chapter 24 Backup Restore ADSL Series User s Guide 242...
Страница 246: ...Chapter 25 Diagnostic ADSL Series User s Guide 246...
Страница 254: ...Chapter 26 Troubleshooting ADSL Series User s Guide 254...
Страница 262: ...Chapter 27 Product Specifications ADSL Series User s Guide 262...
Страница 302: ...Appendix B Setting Up Your Computer s IP Address ADSL Series User s Guide 302...
Страница 310: ...Appendix C Pop up Windows Java Script and Java Permissions ADSL Series User s Guide 310...
Страница 334: ...Appendix E Common Services ADSL Series User s Guide 334...
Страница 355: ...Appendix F Open Software Announcements ADSL Series User s Guide 355...
Страница 356: ...Appendix F Open Software Announcements ADSL Series User s Guide 356...
Страница 360: ...Appendix G Legal Information ADSL Series User s Guide 360...