Chapter 19 IPSec VPN
ZyWALL USG 50-H User’s Guide
334
Main mode takes six steps to establish an IKE SA.
Steps 1 - 2: The ZyWALL sends its proposals to the remote IPSec router. The remote IPSec
router selects an acceptable proposal and sends it back to the ZyWALL.
Steps 3 - 4: The ZyWALL and the remote IPSec router exchange pre-shared keys for
authentication and participate in a Diffie-Hellman key exchange, based on the accepted DH
key group, to establish a shared secret.
Steps 5 - 6: Finally, the ZyWALL and the remote IPSec router generate an encryption key
(from the shared secret), encrypt their identities, and exchange their encrypted identity
information for authentication.
In contrast, aggressive
mode only takes three steps to establish an IKE SA. Aggressive mode
does not provide as much security because the identity of the ZyWALL and the identity of the
remote IPSec router are not encrypted. It is usually used in remote-access situations, where the
address of the initiator is not known by the responder and both parties want to use pre-shared
keys for authentication. For example, the remote IPSec router may be a telecommuter who
does not have a static IP address.
VPN, NAT, and NAT Traversal
In the following example, there is another router (
A
) between router
X
and router
Y
.
Figure 250
VPN/NAT Example
If router
A
does NAT, it might change the IP addresses, port numbers, or both. If router
X
and
router
Y
try to establish a VPN tunnel, the authentication fails because it depends on this
information. The routers cannot establish a VPN tunnel.
Most routers like router
A
now have an IPSec pass-thru feature. This feature helps router
A
recognize VPN packets and route them appropriately. If router
A
has this feature, router
X
and
router
Y
can establish a VPN tunnel as long as the active protocol is ESP. (See
for more information about active protocols.)
If router A does not have an IPSec pass-thru or if the active protocol is AH, you can solve this
problem by enabling NAT traversal. In NAT traversal, router
X
and router
Y
add an extra
header to the IKE SA and IPSec SA packets. If you configure router
A
to forward these
packets unchanged, router
X
and router
Y
can establish a VPN tunnel.
You have to do the following things to set up NAT traversal.
• Enable NAT traversal on the ZyWALL and remote IPSec router.
• Configure the NAT router to forward packets with the extra header unchanged. (See the
field description for detailed information about the extra header.)
The extra header may be UDP port 500 or UDP port 4500, depending on the standard(s) the
ZyWALL and remote IPSec router support.
A
X
Y
Содержание ZyWall USG 50-H Series
Страница 2: ......
Страница 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Страница 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Страница 30: ...30...
Страница 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Страница 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Страница 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Страница 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Страница 146: ...146...
Страница 156: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 156 Figure 128 Network Interface Ethernet Edit wan2...
Страница 157: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 157 Figure 129 Network Interface Ethernet Edit lan1...
Страница 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Страница 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Страница 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Страница 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Страница 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Страница 287: ...287 PART III Firewall Firewall 289...
Страница 288: ...288...
Страница 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Страница 306: ...306...
Страница 313: ...Chapter 19 IPSec VPN ZyWALL USG 50 H User s Guide 313 Figure 238 VPN IPSec VPN VPN Connection Edit IKE...
Страница 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Страница 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Страница 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Страница 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Страница 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Страница 396: ...396...
Страница 421: ...421 PART VI Anti X ADP 423...
Страница 422: ...422...
Страница 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Страница 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Страница 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Страница 442: ...442...
Страница 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Страница 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Страница 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Страница 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Страница 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Страница 511: ...511 PART VIII System System 513...
Страница 512: ...512...
Страница 552: ...552...
Страница 568: ...Chapter 38 Logs ZyWALL USG 50 H User s Guide 568 Figure 464 Maintenance Log Log Setting Edit System Log...
Страница 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Страница 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Страница 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Страница 598: ...598...
Страница 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Страница 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Страница 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...