ZyXEL Communications wireless n gigbit router zyxel manual Negotiation Mode, 222

Models: wireless n gigbit router zyxel

1 384
Download 384 pages 30.66 Kb
Page 222
Image 222

Chapter 15 IPSec VPN

Table 72 VPN Example: Matching ID Type and Content

NBG-460N

REMOTE IPSEC ROUTER

Peer ID type: IP

Peer ID type: E-mail

 

 

Peer ID content: 1.1.1.2

Peer ID content: tom@yourcompany.com

 

 

In the following example, the ID type and content do not match so the authentication fails and the NBG-460N and the remote IPSec router cannot establish an IKE SA.

Table 73 VPN Example: Mismatching ID Type and Content

NBG-460N

REMOTE IPSEC ROUTER

Local ID type: E-mail

Local ID type: IP

 

 

Local ID content: tom@yourcompany.com

Local ID content: 1.1.1.2

 

 

Peer ID type: IP

Peer ID type: E-mail

 

 

Peer ID content: 1.1.1.15

Peer ID content: tom@yourcompany.com

 

 

15.6.5 Negotiation Mode

There are two negotiation modes: main mode and aggressive mode. Main mode provides better security, while aggressive mode is faster.

Main mode takes six steps to establish an IKE SA.

Steps 1-2:The NBG-460N sends its proposals to the remote IPSec router. The remote IPSec router selects an acceptable proposal and sends it back to the NBG- 460N.

Steps 3-4:The NBG-460N and the remote IPSec router participate in a Diffie- Hellman key exchange, based on the accepted DH key group, to establish a shared secret.

Steps 5-6:Finally, the NBG-460N and the remote IPSec router generate an encryption key from the shared secret, encrypt their identities, and exchange their encrypted identity information for authentication.

In contrast, aggressive mode only takes three steps to establish an IKE SA.

Step 1: The NBG-460N sends its proposals to the remote IPSec router. It also starts the Diffie-Hellman key exchange and sends its (unencrypted) identity to the remote IPSec router for authentication.

Step 2: The remote IPSec router selects an acceptable proposal and sends it back to the NBG-460N. It also finishes the Diffie-Hellman key exchange, authenticates the NBG-460N, and sends its (unencrypted) identity to the NBG-460N for authentication.

222

NBG-460N User’s Guide

Page 222
Image 222
ZyXEL Communications wireless n gigbit router zyxel Negotiation Mode, 222, VPN Example Mismatching ID Type and Content