ZyWALL 2 and ZyWALL 2WE
| Table |
LABEL | DESCRIPTION |
|
|
| Select DES, 3DES or NULL from the |
| When DES is used for data communications, both sender and receiver must know the |
| same secret key, which can be used to encrypt and decrypt the message or to |
Encryption Algorithm | generate and verify a message authentication code. The DES encryption algorithm |
| uses a |
| a result, 3DES is more secure than DES. It also requires more processing power, |
| resulting in increased latency and decreased throughput. Select NULL to set up a |
| tunnel without encryption. When you select NULL, you do not enter an encryption key. |
|
|
Authentication | Select SHA1 or MD5 from the |
(Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The | |
Algorithm | SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 |
| for minimal security and |
|
|
Advanced | Click Advanced to configure more detailed settings of your IKE key management. |
|
|
Click Apply to save your changes back to the ZyWALL. Click Reset to begin configuring this screen afresh.
27.10IKE Phases
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate SAs for IPSec.
FigureIn phase 1 you must:
VPN/IPSec Setup |