Ipsec Setting (Ike Phase 2); Figure 20 Vpn Wizard : Ipsec Setting; Table 16 Vpn Wizard : Ipsec Setting - ZyXEL Communications ZyWall 35 User Manual

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide

3.3.3 IPSec Setting (IKE Phase 2)

Figure 20 VPN Wizard : IPSec Setting

The following table describes the labels in this screen.

Table 16 VPN Wizard : IPSec Setting

LABEL
Encapsulation Mode
IPSec Protocol
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
SA Life Time
(Seconds)
84
DESCRIPTION
Select Tunnel mode or Transport mode.
Select the security protocols used for an SA.
Both AH and ESP increase ZyWALL processing requirements and
communications latency (delay).
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES. Select NULL to set up a tunnel without encryption. When you select
NULL, you do not enter an encryption key.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Chapter 3 Wizard Setup

Advertisement

Table of Contents
loading

Table of Contents