| ZyWALL 2 and ZyWALL 2WE | |
| Table | |
|
| |
LABEL | DESCRIPTION | |
|
| |
| Define the length of time before an IKE SA automatically renegotiates in this field. It may | |
SA Life Time | range from 60 to 3,000,000 seconds (almost 35 days). A short SA Life Time increases | |
security by forcing the two VPN gateways to update the encryption and authentication | ||
| keys. However, every time the VPN tunnel renegotiates, all users accessing remote | |
| resources are temporarily disconnected. | |
|
| |
| You must choose a key group for phase 1 IKE setup. DH1 (default) refers to Diffie- | |
Key Group | Hellman Group 1 a 768 bit random number. DH2 refers to | |
| 1024 bit (1Kb) random number. | |
|
| |
| Type your | |
party during a phase 1 IKE negotiation. It is called | ||
share it with another party before you can communicate with them over a secure | ||
| ||
| connection. | |
|
| |
IKE Phase 2 | A phase 2 exchange uses the IKE SA established in phase 1 to negotiate the SA for | |
IPSec. | ||
| ||
|
| |
Encapsulation Mode | Select Tunnel mode or Transport mode from the drop down | |
| encapsulation mode should be identical to the secure remote gateway. | |
| Select ESP or AH from the | |
| identical to the secure remote gateway. The ESP (Encapsulation Security Payload) | |
| protocol (RFC 2406) provides encryption as well as the authentication offered by AH. If | |
IPSec Protocol | you select ESP here, you must select options from the Encryption Algorithm and | |
Authentication Algorithm fields (described below). The AH protocol (Authentication | ||
| Header Protocol) (RFC 2402) was designed for integrity, authentication, sequence | |
| integrity (replay resistance), and | |
| ESP was designed. If you select AH here, you must select options from the | |
| Authentication Algorithm field. | |
|
| |
| The encryption algorithm for the ZyWALL and the secure remote gateway should be | |
| identical. When DES is used for data communications, both sender and receiver must | |
Encryption Algorithm | know the same secret key, which can be used to encrypt and decrypt the message. The | |
DES encryption algorithm uses a | ||
| that uses a | |
| more processing power, resulting in increased latency and decreased throughput. | |
|
|
VPN/IPSec Setup |