Vpn Wizard Setup Complete - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

Table 20 VPN Wizard: VPN Status (continued)
LABEL
Starting IP Address
Ending IP Address/
Subnet Mask
Remote Network
Starting IP Address
Ending IP Address/
Subnet Mask
IKE Tunnel Setting
(IKE Phase 1)
Negotiation Mode
Encryption
Algorithm
Authentication
Algorithm
Key Group
SA Life Time
(Seconds)
Pre-Shared Key
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tunnel mode or Transport mode.
IPSec Protocol
Encryption
Algorithm
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back
Finish

3.8 VPN Wizard Setup Complete

Congratulations! You have successfully set up the VPN rule for your ZyWALL. If you already
had VPN rules configured, the wizard adds the new VPN rule after the last existing VPN rule.
ZyWALL P1 User's Guide
DESCRIPTION
This is a (static) IP address on the LAN behind your ZyWALL.
When the local network is configured for a single IP address, this field is N/A.
When the local network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the local network is configured for a subnet, this is a subnet mask on the
LAN behind your ZyWALL.
This is a (static) IP address on the network behind the remote IPSec router.
When the remote network is configured for a single IP address, this field is N/A.
When the remote network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the remote network is configured for a subnet, this is a
subnet mask on the network behind the remote IPSec router.
This shows Main Mode or Aggressive Mode. Multiple SAs connecting through
a secure gateway must have the same negotiation mode.
This is the method of data encryption. Options can be DES, 3DES or AES.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the key group you chose for phase 1 IKE setup.
This is the length of time before an IKE SA automatically renegotiates.
This is a pre-shared key identifying a communicating party during a phase 1 IKE
negotiation.
ESP or AH are the security protocols used for an SA.
This is the method of data encryption. Options can be DES, 3DES, AES or
NULL.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec
SA setup. Otherwise, DH1 or DH2 are selected to enable PFS.
Click Back to return to the previous screen.
Click Finish to complete and save the wizard setup.
Chapter 3 Wizard Setup
79

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents