Chapter 15 Vpn Screens; Vpn/Ipsec Overview; Ipsec Algorithms; Ah (Authentication Header) Protocol - ZyXEL Communications Prestige 661H Series User Manual

Adsl 2+ security gateway
Hide thumbs Also See for Prestige 661H Series:
Table of Contents

Advertisement

This chapter introduces the VPN screens. See the Logs chapter for information on viewing
logs and the appendix for IPSec log descriptions.

15.1 VPN/IPSec Overview

Use the screens documented in this chapter to configure rules for VPN connections and
manage VPN connections.

15.2 IPSec Algorithms

The ESP and AH protocols are necessary to create a Security Association (SA), the
foundation of an IPSec VPN. An SA is built from the authentication provided by the AH and
ESP protocols. The primary function of key management is to establish and maintain the SA
between systems. Once the SA is established, the transport of data may commence.

15.2.1 AH (Authentication Header) Protocol

AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not for confidentiality, for which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by government
encryption restrictions, an AH can be employed to ensure integrity. This type of
implementation does not protect the information from dissemination but will allow for
verification of the integrity of the information and authentication of the originator.

Chapter 15 VPN Screens

Prestige 661H/HW Series User's Guide
C
H A P T E R
VPN Screens
1 5
176

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 661hw series

Table of Contents