Chapter 20 IPSec VPN
Table 119 VPN > IPSec VPN > VPN Gateway > Edit (continued)
LABEL | DESCRIPTION |
Peer ID Type | Select which type of identification is used to identify the remote IPSec router |
| during authentication. Choices are: |
| IP - the remote IPSec router is identified by an IP address |
| DNS - the remote IPSec router is identified by a domain name |
| |
| Any - the ZyWALL does not check the identity of the remote IPSec router |
| If the ZyWALL and remote IPSec router use certificates, there is one more choice. |
| Subject Name - the remote IPSec router is identified by the subject name in the |
| certificate |
|
|
Content | This field is disabled if the Peer ID Type is Any. Type the identity of the remote |
| IPSec router during authentication. The identity depends on the Peer ID Type. |
| If the ZyWALL and remote IPSec router do not use certificates, |
| IP - type an IP address; see the note at the end of this description. |
| DNS - type the domain name; you can use up to 31 ASCII characters including |
| spaces, although trailing spaces are truncated. This value is only used for |
| identification and can be any string. |
| |
| ASCII characters including spaces, although trailing spaces are truncated. This |
| value is only used for identification and can be any string. |
| If the ZyWALL and remote IPSec router use certificates, type the following fields |
| from the certificate used by the remote IPSec router. |
| IP - subject alternative name field; see the note at the end of this description. |
| DNS - subject alternative name field |
| |
| Subject Name - subject name (maximum 255 ASCII characters, including |
| spaces) |
| Note: If Peer ID Type is IP, please read the rest of this section. |
If you type 0.0.0.0, the ZyWALL uses the IP address specified in the Secure
Gateway Address field. This is not recommended in the following situations:
•There is a NAT router between the ZyWALL and remote IPSec router.
•You want the remote IPSec router to be able to distinguish between IPSec SA requests that come from IPSec routers with dynamic WAN IP addresses.
In these situations, use a different IP address, or use a different Peer ID Type.
Phase 1 Settings | Click Advanced to display more settings. Click Basic to display fewer settings. |
|
|
SA Life Time | Type the maximum number of seconds the IKE SA can last. When this time has |
(Seconds) | passed, the ZyWALL and remote IPSec router have to update the encryption and |
| authentication keys and |
| IPSec SAs, however. |
|
|
Negotiation | Select the negotiation mode to use to negotiate the IKE SA. Choices are |
Mode | Main - this encrypts the ZyWALL’s and remote IPSec router’s identities but takes |
| more time to establish the IKE SA |
| Aggressive - this is faster but does not encrypt the identities |
| The ZyWALL and the remote IPSec router must use the same negotiation mode. |
|
|
Proposal |
|
#This field is a sequential value, and it is not associated with a specific proposal. The sequence of proposals should not affect performance significantly.
| 367 |
ZyWALL USG 100/200 Series User’s Guide | |
|
|