Figure 77 Ike Sa: Main Negotiation Mode, Steps 1 - 2: Ike Sa Proposal; Figure 78 Ike Sa: Main Negotiation Mode, Steps 3 - 4: Dh Key Exchange - ZyXEL Communications G.SHDSL.bis 4-port Security Gateway P-793H User Manual

G.shdsl.bis 4-port security gateway
Table of Contents

Advertisement

11.1.1.2 IKE SA Proposal
The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm,
and Diffie-Hellman (DH) key group that the ZyXEL Device and remote IPSec router use in
the IKE SA. In main mode, this is done in steps 1 and 2, as illustrated below.

Figure 77 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal

The ZyXEL Device sends one or more proposals to the remote IPSec router. (In some devices,
you can set up only one proposal.) Each proposal consists of an encryption algorithm,
authentication algorithm, and DH key group that the ZyXEL Device wants to use in the IKE
SA. The remote IPSec router selects an acceptable proposal and sends the accepted proposal
back to the ZyXEL Device. If the remote IPSec router rejects all of the proposals (for example,
if the VPN tunnel is not configured correctly), the ZyXEL Device and remote IPSec router
cannot establish an IKE SA.
Both routers must use the same encryption algorithm, authentication
algorithm, and DH key group.
See the field descriptions for information about specific encryption algorithms, authentication
algorithms, and DH key groups. You can also see
information about the role of DH key groups.
11.1.1.3 Diffie-Hellman (DH) Key Exchange
The ZyXEL Device and the remote IPSec router use a DH key exchange to establish a shared
secret, which is used to generate encryption keys for IKE SA and IPSec SA. In main mode, the
DH key exchange is done in steps 3 and 4, as illustrated below.

Figure 78 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange

The DH key exchange is based on DH key groups. Each key group is a fixed number of bits
long. The longer the key, the more secure the encryption keys, but also the longer it takes to
encrypt and decrypt information. For example, DH2 keys (1024 bits) are more secure than
DH1 keys (768 bits), but DH2 encryption keys take longer to encrypt and decrypt.
P-793H User's Guide
Chapter 11 IPSec VPN
Section 11.1.1.3 on page 155
for more
155

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-793h

Table of Contents