Ike Phases - ZyXEL Communications Prestige 652H series User Manual

Adsl security/wireless lan router
Hide thumbs Also See for Prestige 652H series:
Table of Contents

Advertisement

Prestige 652H/HW Series User's Guide
LABEL
Encryption Algorithm
Authentication
Algorithm
Advanced
Back
Apply
Cancel
Delete

16.11 IKE Phases

There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase
2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate
SAs for IPSec.
16-16
Table 16-7 VPN IKE
Select DES, 3DES, AES or NULL from the drop-down list box.
When you use one of these encryption algorithms for data communications, both
the sending device and the receiving device must use the same secret key, which
can be used to encrypt and decrypt the message or to generate and verify a
message authentication code. The DES encryption algorithm uses a 56-bit key.
Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES
is more secure than DES. It also requires more processing power, resulting in
increased latency and decreased throughput. This implementation of AES uses a
128-bit key. AES is faster than 3DES.
Select NULL to set up a tunnel without encryption. When you select NULL, you do
not enter an encryption key.
Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and
SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet
data. The SHA1 algorithm is generally considered stronger than MD5, but is
slower. Select MD5 for minimal security and SHA-1 for maximum security.
Click Advanced to configure more detailed settings of your IKE key management.
Click Back to return to the previous screen.
Click Apply to save your changes back to the Prestige.
Click Cancel to begin configuring this screen afresh.
Click Delete to delete the current rule.
DESCRIPTION
VPN Screens

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 652hw series

Table of Contents