|
| ||
| Table 52 Security > VPN > Rule Setup: IKE (Basic) (continued) | ||
| LABEL | DESCRIPTION |
|
|
|
|
|
| Type your |
| |
|
| communicating party during a phase 1 IKE negotiation. It is called |
|
|
| because you have to share it with another party before you can communicate |
|
|
| with them over a secure connection. |
|
|
| Type from 8 to 31 |
|
|
|
| |
|
| x), which is not counted as part of the 16 to 62 character range for the key. For |
|
|
| example, in "0x0123456789ABCDEF", “0x” denotes that the key is hexadecimal |
|
|
| and “0123456789ABCDEF” is the key itself. |
|
|
| Both ends of the VPN tunnel must use the same |
|
|
| a “PYLD_MALFORMED” (payload malformed) packet if the same |
|
|
| is not used on both ends. |
|
|
|
|
|
| Encryption | Select which key size and encryption algorithm to use for data communications. |
|
| Algorithm | Choices are: |
|
|
| DES - a |
|
|
| 3DES - a |
|
|
| The ZyXEL Device and the remote IPSec router must use the same algorithms |
|
|
| and key , which can be used to encrypt and decrypt the message or to generate |
|
|
| and verify a message authentication code. Longer keys require more processing |
|
|
| power, resulting in increased latency and decreased throughput. |
|
|
|
|
|
| Authentication | Select which hash algorithm to use to authenticate packet data. Choices are |
|
| Algorithm | SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also |
|
|
| slower. |
|
|
|
|
|
| Advanced... | Click Advanced... to configure more detailed settings of your IKE key |
|
|
| management. |
|
|
|
|
|
| Apply | Click Apply to save your changes back to the ZyXEL Device. |
|
|
|
|
|
| Reset | Click Reset to begin configuring this screen afresh. |
|
|
|
|
|
13.5 Advanced VPN Rule Setup (IKE)
Click Advanced... in the Rule Setup screen to open this screen.
Chapter 13 IPSec VPN | 153 |