Chapter 19 IPSec VPN
ZyWALL USG 50-H User’s Guide
335
Extended Authentication
Extended authentication is often used when multiple IPSec routers use the same VPN tunnel to
connect to a single IPSec router. For example, this might be used with telecommuters.
In extended authentication, one of the routers (the ZyWALL or the remote IPSec router)
provides a user name and password to the other router, which uses a local user database and/or
an external server to verify the user name and password. If the user name or password is
wrong, the routers do not establish an IKE SA.
You can set up the ZyWALL to provide a user name and password to the remote IPSec router,
or you can set up the ZyWALL to check a user name and password that is provided by the
remote IPSec router.
If you use extended authentication, it takes four more steps to establish an IKE SA. These
steps occur at the end, regardless of the negotiation mode (steps 7-10 in main mode, steps 4-7
in aggressive mode).
Certificates
It is possible for the ZyWALL and remote IPSec router to authenticate each other with
certificates. In this case, you do not have to set up the pre-shared key, local identity, or remote
identity because the certificates provide this information instead.
• Instead of using the pre-shared key, the ZyWALL and remote IPSec router check the
signatures on each other’s certificates. Unlike pre-shared keys, the signatures do not have
to match.
• The local and peer ID type and content come from the certificates.
"
You must set up the certificates for the ZyWALL and remote IPSec router first.
Regular Expressions in Searching IPSec SAs
A question mark (?) lets a single character in the VPN connection or policy name vary. For
example, use “a?c” (without the quotation marks) to specify abc, acc and so on.
Wildcards (*) let multiple VPN connection or policy names match the pattern. For example,
use “*abc” (without the quotation marks) to specify any VPN connection or policy name that
ends with “abc”. A VPN connection named “testabc” would match. There could be any
number (of any type) of characters in front of the “abc” at the end and the VPN connection or
policy name would still match. A VPN connection or policy name named “testacc” for
example would not match.
A * in the middle of a VPN connection or policy name has the ZyWALL check the beginning
and end and ignore the middle. For example, with “abc*123”, any VPN connection or policy
name starting with “abc” and ending in “123” matches, no matter how many characters are in
between.
The whole VPN connection or policy name has to match if you do not use a question mark or
asterisk.
Содержание ZyWall USG 50-H Series
Страница 2: ......
Страница 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Страница 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Страница 30: ...30...
Страница 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Страница 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Страница 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Страница 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Страница 146: ...146...
Страница 156: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 156 Figure 128 Network Interface Ethernet Edit wan2...
Страница 157: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 157 Figure 129 Network Interface Ethernet Edit lan1...
Страница 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Страница 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Страница 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Страница 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Страница 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Страница 287: ...287 PART III Firewall Firewall 289...
Страница 288: ...288...
Страница 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Страница 306: ...306...
Страница 313: ...Chapter 19 IPSec VPN ZyWALL USG 50 H User s Guide 313 Figure 238 VPN IPSec VPN VPN Connection Edit IKE...
Страница 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Страница 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Страница 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Страница 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Страница 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Страница 396: ...396...
Страница 421: ...421 PART VI Anti X ADP 423...
Страница 422: ...422...
Страница 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Страница 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Страница 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Страница 442: ...442...
Страница 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Страница 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Страница 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Страница 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Страница 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Страница 511: ...511 PART VIII System System 513...
Страница 512: ...512...
Страница 552: ...552...
Страница 568: ...Chapter 38 Logs ZyWALL USG 50 H User s Guide 568 Figure 464 Maintenance Log Log Setting Edit System Log...
Страница 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Страница 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Страница 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Страница 598: ...598...
Страница 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Страница 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Страница 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...