beautypg.com

3 ike sa setup, 1 ike sa proposal – ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 261

background image

Chapter 14 IPSec VPN

ZyWALL 2WG User’s Guide

261

14.3 IKE SA Setup

This section provides more details about IKE SAs.

14.3.1 IKE SA Proposal

The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm,
and Diffie-Hellman (DH) key group that the ZyWALL and remote IPSec router use in the IKE
SA. In main mode, this is done in steps 1 and 2, as illustrated below.

Figure 145 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal

The ZyWALL sends one or more proposals to the remote IPSec router. (In some devices, you
can set up only one proposal.) Each proposal consists of an encryption algorithm,
authentication algorithm, and DH key group that the ZyWALL wants to use in the IKE SA.
The remote IPSec router selects an acceptable proposal and sends the accepted proposal back
to the ZyWALL. If the remote IPSec router rejects all of the proposals (for example, if the
VPN tunnel is not configured correctly), the ZyWALL and remote IPSec router cannot
establish an IKE SA.

"

Both routers must use the same encryption algorithm, authentication
algorithm, and DH key group.

Click this icon to display a screen in which you can associate a network policy

to a gateway policy.

Click this icon to display a screen in which you can change the settings of a

gateway or network policy.

Click this icon to delete a gateway or network policy. The ZyWALL

automatically moves the associated network policy(ies) to the recycle bin.

Click this icon to establish a VPN connection to a remote network.

Click this icon to drop a VPN connection to a remote network.

This indicates that a network policy is not active.

Recycle Bin

The recycle bin holds any network policies without an associated gateway

policy.

Table 81 SECURITY > VPN > VPN Rules (IKE) (continued)

LABEL

DESCRIPTION