ZyXEL NBG-460N User Guide - Page 194
VPN Rule Setup Advanced
View all ZyXEL NBG-460N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 194 highlights
Chapter 15 IPSec VPN Table 65 Security > VPN > General > Rule Setup: IKE (Basic) (continued) LABEL DESCRIPTION IPSec Protocol Select the security protocols used for an SA. Both AH and ESP increase processing requirements and communications latency (delay). Pre-Shared Key If you select ESP here, you must select options from the Encryption Algorithm and Authentication Algorithm fields (described below). Type your pre-shared key in this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection. Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x" (zero x), which is not counted as part of the 16 to 62 character range for the key. For example, in "0x0123456789ABCDEF", "0x" denotes that the key is hexadecimal and "0123456789ABCDEF" is the key itself. Encryption Algorithm Both ends of the VPN tunnel must use the same pre-shared key. You will receive a "PYLD_MALFORMED" (payload malformed) packet if the same pre-shared key is not used on both ends. Select which key size and encryption algorithm to use for data communications. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm Authentication Algorithm Advanced... Apply Reset Cancel The NBG-460N and the remote IPSec router must use the same algorithms and key , which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. Longer keys require more processing power, resulting in increased latency and decreased throughput. Select which hash algorithm to use to authenticate packet data. Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also slower. Click Advanced... to configure more detailed settings of your IKE key management. Click Apply to save your changes back to the NBG-460N. Click Reset to begin configuring this screen afresh. Click Cancel to exit the screen without making any changes. 15.4.2 VPN Rule Setup (Advanced) Click the Advanced... button in the Rule Setup screen to open this screen. 194 NBG-460N User's Guide