Table 19 Vpn Wizard: Vpn Status - ZyXEL Communications ZYWALL 2 PLUS User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL 2 PLUS:
Table of Contents

Advertisement

The following table describes the labels in this screen.

Table 19 VPN Wizard: VPN Status

LABEL
Gateway Policy
Property
Name
Gateway Policy
Setting
My ZyWALL
Remote Gateway
Address
Network Policy
Property
Active
Name
Network Policy
Setting
Local Network
Starting IP Address
Ending IP Address/
Subnet Mask
Remote Network
Starting IP Address
Ending IP Address/
Subnet Mask
IKE Tunnel Setting
(IKE Phase 1)
Negotiation Mode
Encryption
Algorithm
Authentication
Algorithm
Key Group
SA Life Time
(Seconds)
Pre-Shared Key
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tunnel mode or Transport mode.
ZyWALL 2 Plus User's Guide
DESCRIPTION
This is the name of this VPN gateway policy.
This is the WAN IP address or the domain name of your ZyWALL in router
mode or the ZyWALL's IP address in bridge mode.
This is the IP address or the domain name used to identify the remote IPSec
router.
This displays whether this VPN network policy is enabled or not.
This is the name of this VPN network policy.
This is a (static) IP address on the LAN behind your ZyWALL.
When the local network is configured for a single IP address, this field is N/A.
When the local network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the local network is configured for a subnet, this is a subnet mask on the
LAN behind your ZyWALL.
This is a (static) IP address on the network behind the remote IPSec router.
When the remote network is configured for a single IP address, this field is N/A.
When the remote network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the remote network is configured for a subnet, this is a
subnet mask on the network behind the remote IPSec router.
This shows Main Mode or Aggressive Mode. Multiple SAs connecting through
a secure gateway must have the same negotiation mode.
This is the method of data encryption. Options can be DES, 3DES or AES.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the key group you chose for phase 1 IKE setup.
This is the length of time before an IKE SA automatically renegotiates.
This is a pre-shared key identifying a communicating party during a phase 1 IKE
negotiation.
Chapter 3 Wizard Setup
83

Advertisement

Table of Contents
loading

Table of Contents