3 ike sa setup, 1 ike sa proposal – ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 261

Chapter 14 IPSec VPN
ZyWALL 2WG User’s Guide
261
14.3 IKE SA Setup
This section provides more details about IKE SAs.
14.3.1 IKE SA Proposal
The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm,
and Diffie-Hellman (DH) key group that the ZyWALL and remote IPSec router use in the IKE
SA. In main mode, this is done in steps 1 and 2, as illustrated below.
Figure 145 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
The ZyWALL sends one or more proposals to the remote IPSec router. (In some devices, you
can set up only one proposal.) Each proposal consists of an encryption algorithm,
authentication algorithm, and DH key group that the ZyWALL wants to use in the IKE SA.
The remote IPSec router selects an acceptable proposal and sends the accepted proposal back
to the ZyWALL. If the remote IPSec router rejects all of the proposals (for example, if the
VPN tunnel is not configured correctly), the ZyWALL and remote IPSec router cannot
establish an IKE SA.
"
Both routers must use the same encryption algorithm, authentication
algorithm, and DH key group.
Click this icon to display a screen in which you can associate a network policy
to a gateway policy.
Click this icon to display a screen in which you can change the settings of a
gateway or network policy.
Click this icon to delete a gateway or network policy. The ZyWALL
automatically moves the associated network policy(ies) to the recycle bin.
Click this icon to establish a VPN connection to a remote network.
Click this icon to drop a VPN connection to a remote network.
This indicates that a network policy is not active.
Recycle Bin
The recycle bin holds any network policies without an associated gateway
policy.
Table 81 SECURITY > VPN > VPN Rules (IKE) (continued)
LABEL
DESCRIPTION