ZyXEL Communications ZyWall 70 User Manual page 90

Internet security appliance
Hide thumbs Also See for ZyWall 70:
Table of Contents

Advertisement

ZyWALL 70 User's Guide
Table 17 VPN Wizard: VPN Status (continued)
LABEL
Active
Name
Network Policy
Setting
Local Network
Starting IP Address
Ending IP Address/
Subnet Mask
Remote Network
Starting IP Address
Ending IP Address/
Subnet Mask
IKE Tunnel Setting
(IKE Phase 1)
Negotiation Mode
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES or AES.
Authentication
Algorithm
Key Group
SA Life Time
(Seconds)
Pre-Shared Key
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tunnel mode or Transport mode.
IPSec Protocol
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES, AES or
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back
Finish
90
DESCRIPTION
This displays whether this VPN network policy is enabled or not.
This is the name of this VPN network policy.
This is a (static) IP address on the LAN behind your ZyWALL.
When the local network is configured for a single IP address, this field is N/A.
When the local network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the local network is configured for a subnet, this is a subnet mask on the
LAN behind your ZyWALL.
This is a (static) IP address on the network behind the remote IPSec router.
When the remote network is configured for a single IP address, this field is N/A.
When the remote network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the remote network is configured for a subnet, this is a
subnet mask on the network behind the remote IPSec router.
This shows Main Mode or Aggressive Mode. Multiple SAs connecting through
a secure gateway must have the same negotiation mode.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the key group you chose for phase 1 IKE setup.
This is the length of time before an IKE SA automatically renegotiates.
This is a pre-shared key identifying a communicating party during a phase 1 IKE
negotiation.
ESP or AH are the security protocols used for an SA.
NULL.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA
setup. Otherwise, DH1 or DH2 are selected to enable PFS.
Click Back to return to the previous screen.
Click Finish to complete and save the wizard setup.
Chapter 3 Wizard Setup

Advertisement

Table of Contents
loading

Table of Contents