ZyXEL Communications ZyWALL 5 Support Notes page 54

Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

6) Extended Authentication (xAuth) can be enabled or not depending on your application. For detailed
info, you can refer to XXX.
7) Under "IKE Proposal", select the Encryption and Authentication Algorithm. Note the configuration
must be consist on both ZyWALLs (GW1 & GW2)
8) Click on "Apply" to save profile
9) The IKE rule will be configured as below:
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 5 Support Notes
54

Advertisement

Table of Contents
loading

Table of Contents