ZyXEL Communications P-793H User Manual page 172

G.shdsl.bis 4-port security gateway
Hide thumbs Also See for P-793H:
Table of Contents

Advertisement

P-793H User's Guide
Table 52 VPN > Setup > Edit > Advanced (continued)
LABEL
Pre-Shared Key Type the pre-shared key the IKE SA uses. The ZyXEL Device and remote IPSec
Encryption
Algorithm
Authentication
Algorithm
SA Life Time
(Seconds)
Key Group You must choose a DH key group for the IKE SA. The longer the key group, the
Phase 2
Active Protocol Select the active protocol the IPSec SA uses. It is recommended you select ESP,
Encryption
Algorithm
Authentication
Algorithm
172
DESCRIPTION
router must use the same pre-shared key. If the keys are different, the ZyXEL
Device receives a "PYLD_MALFORMED" (payload malformed) packet.
You can use 8-31 ASCII characters or 16-62 hexadecimal ("0-9", "A-F")
characters. You must precede a hexadecimal key with a "0x" (zero x), which is not
counted as part of the 16-62 characters. For example, in
"0x0123456789ABCDEF", "0x" denotes that the key is hexadecimal and
"0123456789ABCDEF" is the key itself.
Select one of the following encryption algorithms for the IKE SA. The algorithms
are listed in order from weakest to strongest.
Data Encryption Standard (DES) is a widely used (but breakable) method of data
encryption. It applies a 56-bit key to each 64-bit block of data.
Triple DES (3DES) is a variant of DES. It iterates three times with three separate
keys, effectively tripling the strength of DES.
Advanced Encryption Standard (AES) is a newer method of data encryption that
also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data.
Select NULL to set up a VPN tunnel without encryption.
Select one of the following authentication algorithms for the IKE SA. The
algorithms are listed in order from weakest to strongest.
Message Digest 5 (MD5) produces a 128-bit digest to authenticate packets.
Secure Hash Algorithm (SHA1) produces a 160-bit digest to authenticate packets.
Enter the length of time before the ZyXEL Device automatically renegotiates the
IKE SA. It may range from 60 to 3,000,000 seconds (almost 35 days).
A low value increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, if every time the IKE SA is
renegotiated, any users trying to establish IPSec SA experience delays. (Existing
IPSec SA are not affected.)
stronger the encryption, but also the more processing is required.
DH1 refers to Diffie-Hellman Group 1, a 768-bit random number.
DH2 refers to Diffie-Hellman Group 2, a 1024-bit (1Kb) random number.
unless the remote IPSec router only uses AH.
Select one of the following encryption algorithms for the IPSec SA. The algorithms
are listed in order from weakest to strongest.
Data Encryption Standard (DES) is a widely used (but breakable) method of data
encryption. It applies a 56-bit key to each 64-bit block of data.
Triple DES (3DES) is a variant of DES. It iterates three times with three separate
keys, effectively tripling the strength of DES.
Advanced Encryption Standard (AES) is a newer method of data encryption that
also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data.
Select NULL to set up a VPN tunnel without encryption.
Select one of the following authentication algorithms for the IPSec SA. The
algorithms are listed in order from weakest to strongest.
Message Digest 5 (MD5) produces a 128-bit digest to authenticate packets.
Secure Hash Algorithm (SHA1) produces a 160-bit digest to authenticate packets.
Chapter 11 IPSec VPN

Advertisement

Table of Contents
loading

Table of Contents