ZyXEL Communications P-2612HW Series User Manual page 274

802.11g wireless adsl voip iad
Hide thumbs Also See for P-2612HW Series:
Table of Contents

Advertisement

Chapter 14 VPN
Table 84 Security > VPN > Setup > Manual Key (continued)
LABEL
IP Address Start
End / Subnet
Mask
Address
Information
My IP Address
Secure Gateway
Address
Security Protocol
IPSec Protocol
Encryption
Algorithm
Encapsulation
Key (only with
ESP)
Authentication
Algorithm
274
DESCRIPTION
When the Remote Address Type field is configured to Single, enter a
(static) IP address on the network behind the remote IPSec router.
When the Remote Address Type field is configured to Range, enter
the beginning (static) IP address, in a range of computers on the
network behind the remote IPSec router. When the Remote Address
Type field is configured to Subnet, enter a (static) IP address on the
network behind the remote IPSec router.
When the Remote Address Type field is configured to Single, this
field is N/A. When the Remote Address Type field is configured to
Range, enter the end (static) IP address, in a range of computers on
the network behind the remote IPSec router. When the Remote
Address Type field is configured to Subnet, enter a subnet mask on
the network behind the remote IPSec router.
Enter the WAN IP address of your ZyXEL Device. The VPN tunnel has to
be rebuilt if this IP address changes.
The following applies if this field is configured as 0.0.0.0:
The ZyXEL Device uses the current ZyXEL Device WAN IP address
(static or dynamic) to set up the VPN tunnel.
Type the WAN IP address or the URL (up to 31 characters) of the IPSec
router with which you're making the VPN connection.
Select ESP if you want to use ESP (Encapsulation Security Payload).
The ESP protocol (RFC 2406) provides encryption as well as some of
the services offered by AH. If you select ESP here, you must select
options from the Encryption Algorithm and Authentication
Algorithm fields (described next).
Select DES, 3DES or NULL from the drop-down list box.
When DES is used for data communications, both sender and receiver
must know the same secret key, which can be used to encrypt and
decrypt the message or to generate and verify a message
authentication code. The DES encryption algorithm uses a 56-bit key.
Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a
result, 3DES is more secure than DES. It also requires more
processing power, resulting in increased latency and decreased
throughput. Select NULL to set up a tunnel without encryption. When
you select NULL, you do not enter an encryption key.
With DES, type a unique key 8 characters long. With 3DES, type a
unique key 24 characters long. Any characters may be used, including
spaces, but trailing spaces are truncated.
Select SHA1 or MD5 from the drop-down list box. MD5 (Message
Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used
to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal
security and SHA-1 for maximum security.
P-2612HW Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-2612hw-f1

Table of Contents