beautypg.com

ZyXEL Communications ZyXEL ZyWALL 5 User Manual

Page 83

background image

ZyWALL 5 User’s Guide

82

Chapter 3 Wizard Setup

Network Policy

Property

Active

This displays whether this VPN network policy is enabled or not.

Name

This is the name of this VPN network policy.

Network Policy

Setting

Local Network

Starting IP Address

This is a (static) IP address on the LAN behind your ZyWALL.

Ending IP Address/

Subnet Mask

When the local network is configured for a single IP address, this field is N/A.

When the local network is configured for a range IP address, this is the end

(static) IP address, in a range of computers on the LAN behind your ZyWALL.

When the local network is configured for a subnet, this is a subnet mask on the

LAN behind your ZyWALL.

Remote Network

Starting IP Address

This is a (static) IP address on the network behind the remote IPSec router.

Ending IP Address/

Subnet Mask

When the remote network is configured for a single IP address, this field is N/A.

When the remote network is configured for a range IP address, this is the end

(static) IP address, in a range of computers on the network behind the remote

IPSec router. When the remote network is configured for a subnet, this is a

subnet mask on the network behind the remote IPSec router.

IKE Tunnel Setting

(IKE Phase 1)

Negotiation Mode

This shows Main Mode or Aggressive Mode. Multiple SAs connecting through

a secure gateway must have the same negotiation mode.

Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES or AES.

Authentication

Algorithm

MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash

algorithms used to authenticate packet data.

Key Group

This is the key group you chose for phase 1 IKE setup.

SA Life Time

(Seconds)

This is the length of time before an IKE SA automatically renegotiates.

Pre-Shared Key

This is a pre-shared key identifying a communicating party during a phase 1 IKE

negotiation.

IPSec Setting (IKE

Phase 2)

Encapsulation Mode This shows Tunnel mode or Transport mode.

IPSec Protocol

ESP or AH are the security protocols used for an SA.

Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES, AES or

NULL.

Authentication

Algorithm

MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash

algorithms used to authenticate packet data.

SA Life Time

(Seconds)

This is the length of time before an IKE SA automatically renegotiates.

Perfect Forward

Secret (PFS)

Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA

setup. Otherwise, DH1 or DH2 are selected to enable PFS.

Table 16 VPN Wizard : VPN Status (continued)

LABEL

DESCRIPTION