ZyXEL Communications Vantage CNM User Manual page 200

Centralized network management
Hide thumbs Also See for Vantage CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Table 70 Configuration > VPN > IKE IPSec (continued)
LABEL
Remote Network
Address Type
Starting IP Address
Ending IP Address/
Subnet Mask
Remote Port
IPSec Proposal
Encapsulation Mode
Active Protocol
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
SA Life Time
(Seconds)
199
DESCRIPTION
Remote IP addresses must be static and correspond to the remote IPSec
router's configured local IP addresses.
Two active SAs cannot have the local and remote IP address(es) both the same.
Two active SAs can have the same local or remote IP address, but not both. You
can configure multiple SAs between the same local and remote IP addresses,
as long as only one is active at any time.
Use the drop-down list box to choose Single Address, Range Address, or
Subnet Address. Select Single Address with a single IP address. Select
Range Address for a specific range of IP addresses. Select Subnet Address
to specify IP addresses on a network by their subnet mask.
When the Address Type field is configured to Single Address, enter a (static)
IP address on the network behind the remote IPSec router. When the Address
Type field is configured to Range Address, enter the beginning (static) IP
address, in a range of computers on the network behind the remote IPSec
router. When the Address Type field is configured to Subnet Address, enter a
(static) IP address on the network behind the remote IPSec router.
When the Address Type field is configured to Single Address, this field is N/A.
When the Address Type field is configured to Range Address, enter the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the Address Type field is configured to Subnet Address,
enter a subnet mask on the network behind the remote IPSec router.
0 is the default and signifies any port. Type a port number from 0 to 65535 in the
Start and End fields. Some of the most common IP ports are: 21, FTP; 53, DNS;
23, Telnet; 80, HTTP; 25, SMTP; 110, POP3.
Select Tunnel mode or Transport mode.
Select the security protocols used for an SA.
Both AH and ESP increase Prestige processing requirements and
communications latency (delay).
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES. Select NULL to set up a tunnel without encryption. When you select
NULL, you do not enter an encryption key.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Chapter 11 Configuration > VPN

Advertisement

Table of Contents
loading

Table of Contents