ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 324

Internet security appliance
Table of Contents

Advertisement

Table 102 VPN Rules (IKE): Network Policy Edit (continued)
LABEL
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Enable Replay
Detection
Enable Multiple
Proposals
Apply
Cancel
19.13 VPN Rules (IKE): Network Policy Move
Click the move (
Network Policy Move screen. Use this screen to associate a network policy to a gateway rule.
Chapter 19 VPN Screens
DESCRIPTION
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward Secret (PFS) is disabled (NONE) by default in phase 2 IPSec
SA setup. This allows faster IPSec setup, but is not so secure.
Select DH1 or DH2 to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768
bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb)
random number (more secure, yet slower).
As a VPN setup is processing intensive, the system is vulnerable to Denial of
Service (DOS) attacks. The IPSec receiver can detect and reject old or duplicate
packets to protect against replay attacks. Enable replay detection by selecting
this check box.
Select this check box to allow the ZyWALL to use any of its phase 1 or phase 2
encryption and authentication algorithms when negotiating an IPSec SA.
When you enable multiple proposals, the ZyWALL allows the remote IPSec
router to select which encryption and authentication algorithms to use for the
VPN tunnel, even if they are less secure than the ones you configure for the
VPN rule.
Clear this check box to have the ZyWALL use only the phase 1 or phase 2
encryption and authentication algorithms configured below when negotiating an
IPSec SA.
Click Apply to save the changes.
Click Cancel to discard all changes and return to the main VPN screen.
) icon in the VPN Rules (IKE) screen to display the VPN Rules (IKE):
ZyWALL 5/35/70 Series User's Guide
324

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents