3 encryption and authentication algorithms, 5 vpn rules (ike) gateway policy edit – ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 267
Chapter 14 IPSec VPN
ZyWALL 2WG User’s Guide
267
• Should only have IPSec high availability settings in its corresponding IPSec rule if your
ZyWALL has multiple WAN connections
• Should ideally identify itself by a domain name or dynamic domain name (it must
otherwise have My Address set to 0.0.0.0)
• Should use a WAN connectivity check to this ZyWALL’s WAN IP address
If the remote IPSec router is not a ZyWALL, you may also want to avoid setting the IPSec rule
to nailed up.
14.4.3 Encryption and Authentication Algorithms
In most ZyWALLs, you can select one of the following encryption algorithms for each
proposal. The encryption algorithms are listed here in order from weakest to strongest.
• Data Encryption Standard (DES) is a widely used (but breakable) method of data
encryption. It applies a 56-bit key to each 64-bit block of data.
• Triple DES (3DES) is a variant of DES. It iterates three times with three separate keys,
effectively tripling the strength of DES.
• Advanced Encryption Standard (AES) is a newer method of data encryption that also uses
a secret key. AES applies a 128-bit key to 128-bit blocks of data. It is faster than 3DES.
Use the commands to have the AES encryption apply 192-bit or 256-bit keys to 128-bit blocks
of data.
You can select one of the following authentication algorithms for each proposal. The
algorithms are listed here in order from weakest to strongest.
• MD5 (Message Digest 5) produces a 128-bit digest to authenticate packet data.
• SHA1 (Secure Hash Algorithm) produces a 160-bit digest to authenticate packet data.
14.5 VPN Rules (IKE) Gateway Policy Edit
In the VPN Rule (IKE) screen, click the add gateway policy (
) icon or the edit (
) icon
to display the VPN-Gateway Policy -Edit screen.
Use this screen to configure a VPN gateway policy. The gateway policy identifies the IPSec
routers at either end of a VPN tunnel (My ZyWALL and Remote Gateway) and specifies the
authentication, encryption and other settings needed to negotiate a phase 1 IKE SA.