ZyWALL 10/10 II/50 Internet Security Gateway
26-2
VPN/IPSec
Setup
Figure 26-2 Menu 27 — VPN/IPSec Setup
26.2 IPSec Algorithms
The
ESP
and
AH
protocols are necessary to create a Security Association (SA), the foundation of an IPSec
VPN. An SA is built from the authentication provided by the
AH
and
ESP
protocols. The primary function
of key management is to establish and maintain the SA between systems. Once the SA is established, the
transport of data may commence.
26.2.1 AH (Authentication Header) Protocol
AH
protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay resistance),
and non-repudiation but not for confidentiality, for which the
ESP
was designed.
In applications where confidentiality is not required or not sanctioned by government encryption restrictions,
an
AH
can be employed to ensure integrity. This type of implementation does not protect the information
from dissemination but will allow for verification of the integrity of the information and authentication of the
originator.
26.2.2 ESP (Encapsulating Security Payload) Protocol
The
ESP
protocol (RFC 2406) provides encryption as well as some of the services offered by
AH
.
ESP
authenticating properties are limited compared to the
AH
due to the non-inclusion of the IP header
information during the authentication process. However,
ESP
is sufficient if only the upper layer protocols
need to be authenticated.
An added feature of the
ESP
is payload padding, which further protects communications by concealing the
size of the packet being transmitted.
Menu 27 - VPN/IPSec Setup
1. IPSec Summary
2. SA Monitor
3. View IPSec Log
Enter Menu Selection Number:
Содержание ZyWALL 10/10
Страница 1: ...ZyWALL 10 10 II 50 Internet Security Gateway User s Guide Version 3 50 June 2002...
Страница 32: ......
Страница 36: ......
Страница 42: ......
Страница 54: ...ZyWALL 10 10 II 50 Internet Security Gateway 3 6 Initial Setup Figure 3 5 Advanced Management SMT Menus...
Страница 58: ......
Страница 78: ......
Страница 80: ......
Страница 92: ......
Страница 96: ......
Страница 112: ...ZyWALL 10 10 II 50 Internet Security Gateway 9 16 NAT Figure 9 11 Multiple Servers Behind NAT Example...
Страница 122: ......
Страница 140: ......
Страница 164: ...ZyWALL 10 10 II 50 Internet Security Gateway 13 14 Creating Custom Rules Figure 13 6 Timeout Screen...
Страница 166: ......
Страница 186: ......
Страница 206: ......
Страница 212: ......
Страница 226: ......
Страница 244: ......
Страница 252: ......
Страница 258: ......
Страница 260: ......
Страница 290: ......
Страница 294: ......
Страница 300: ......
Страница 302: ......
Страница 308: ......
Страница 314: ......
Страница 316: ......
Страница 318: ......
Страница 322: ......
Страница 334: ......
Страница 342: ...ZyWALL 10 10 II 50 Internet Security Gateway JJ Index Introduction 10 2...