Chapter 21 IPSec VPN
USG20(W)-VPN Series User’s Guide
359
The USG supports IKEv1 and IKEv2. See
IP Addresses of the USG and Remote IPSec Router
To set up an IKE SA, you have to specify the IP addresses of the USG and remote IPSec router. You
can usually enter a static IP address or a domain name for either or both IP addresses. Sometimes,
your USG might offer another alternative, such as using the IP address of a port or interface, as
well.
You can also specify the IP address of the remote IPSec router as 0.0.0.0. This means that the
remote IPSec router can have any IP address. In this case, only the remote IPSec router can initiate
an IKE SA because the USG does not know the IP address of the remote IPSec router. This is often
used for telecommuters.
IKE SA Proposal
The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm, and
Diffie-Hellman (DH) key group that the USG and remote IPSec router use in the IKE SA. In main
mode, this is done in steps 1 and 2, as illustrated next.
Figure 233
IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
The USG sends one or more proposals to the remote IPSec router. (In some devices, you can only
set up one proposal.) Each proposal consists of an encryption algorithm, authentication algorithm,
and DH key group that the USG wants to use in the IKE SA. The remote IPSec router selects an
acceptable proposal and sends the accepted proposal back to the USG. If the remote IPSec router
rejects all of the proposals, the USG and remote IPSec router cannot establish an IKE SA.
Note: Both routers must use the same encryption algorithm, authentication algorithm,
and DH key group.
In most USGs, you can select one of the following encryption algorithms for each proposal. The
algorithms are listed in order from weakest to strongest.
• Data Encryption Standard (DES) is a widely used method of data encryption. It applies a 56-bit
key to each 64-bit block of data.
• Triple DES (3DES) is a variant of DES. It iterates three times with three separate keys, effectively
tripling the strength of DES.
• Advanced Encryption Standard (AES) is a newer method of data encryption that also uses a
secret key. AES applies a 128-bit key to 128-bit blocks of data. It is faster than 3DES.
One or more proposals, each one consisting of:
- encryption algorithm
- authentication algorithm
- Diffie-Hellman key group
1
2
X
Y
Содержание ZyWall USG20-VPN
Страница 17: ...17 PART I User s Guide ...
Страница 18: ...18 ...
Страница 99: ...99 PART II Technical Reference ...
Страница 100: ...100 ...
Страница 151: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 151 Configuration Network Interface Ethernet Edit External Type ...
Страница 152: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 152 Configuration Network Interface Ethernet Edit External Type ...
Страница 154: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 154 Configuration Network Interface Ethernet Edit Internal Type ...
Страница 155: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 155 Figure 121 Configuration Network Interface Ethernet Edit OPT ...
Страница 156: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 156 Configuration Network Interface Ethernet Edit OPT ...
Страница 170: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 170 Figure 127 Configuration Network Interface PPP Add ...
Страница 178: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 178 Figure 129 Configuration Network Interface Cellular Add Edit ...
Страница 194: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 194 Figure 139 Configuration Network Interface VLAN Add Edit ...
Страница 206: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 206 Figure 141 Configuration Network Interface Bridge Add Edit ...
Страница 282: ...Chapter 15 UPnP USG20 W VPN Series User s Guide 282 Figure 190 Network Connections My Network Places Properties Example ...
Страница 340: ...Chapter 21 IPSec VPN USG20 W VPN Series User s Guide 340 Figure 226 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 348: ...Chapter 21 IPSec VPN USG20 W VPN Series User s Guide 348 Figure 228 Configuration VPN IPSec VPN VPN Gateway Add Edit ...
Страница 378: ...Chapter 22 SSL VPN USG20 W VPN Series User s Guide 378 Create a Web Application SSL Application Object ...
Страница 591: ...Chapter 31 Log and Report USG20 W VPN Series User s Guide 591 Figure 418 Configuration Log Report Email Daily Report ...
Страница 659: ...Appendix B Legal Information USG20 W VPN Series User s Guide 659 Environmental Product Declaration ...