ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 97

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Table 19 VPN Wizard: VPN Status (continued)
LABEL
Name
Network Policy
Setting
Local Network
Starting IP Address
Ending IP Address/
Subnet Mask
Remote Network
Starting IP Address
Ending IP Address/
Subnet Mask
IKE Tunnel Setting
(IKE Phase 1)
Negotiation Mode
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES or AES.
Authentication
Algorithm
Key Group
SA Life Time
(Seconds)
Pre-Shared Key
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tunnel mode or Transport mode.
IPSec Protocol
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES, AES or
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back
Finish
97
DESCRIPTION
This is the name of this VPN network policy.
This is a (static) IP address on the LAN behind your ZyWALL.
When the local network is configured for a single IP address, this field is N/A.
When the local network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the local network is configured for a subnet, this is a subnet mask on the
LAN behind your ZyWALL.
This is a (static) IP address on the network behind the remote IPSec router.
When the remote network is configured for a single IP address, this field is N/A.
When the remote network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the remote network is configured for a subnet, this is a
subnet mask on the network behind the remote IPSec router.
This shows Main Mode or Aggressive Mode. Multiple SAs connecting through
a secure gateway must have the same negotiation mode.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the key group you chose for phase 1 IKE setup.
This is the length of time before an IKE SA automatically renegotiates.
This is a pre-shared key identifying a communicating party during a phase 1 IKE
negotiation.
ESP or AH are the security protocols used for an SA.
NULL.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA
setup. Otherwise, DH1 or DH2 are selected to enable PFS.
Click Back to return to the previous screen.
Click Finish to complete and save the wizard setup.
Chapter 3 Wizard Setup

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents