ZyXEL SBG3300-NB00 User Guide - Page 283

Default_L2TPVPN, Remote Access IPsec, Encryption, Authentication, Key Group, Table 90, LABEL,

Page 283 highlights

Chapter 20 IPSec VPN Table 90 VPN > IPSec VPN > Setup > Edit (continued) LABEL DESCRIPTION Phase 1 Phase 1 Encryption and Authentication can have up to 3 algorithm pairs. You cannot use phase 1 Encryption, Authentication, and Key Group pairs that already exist in other enabled IPsec rules with Remote Access selected as the Application Scenario. AES is considered as the same encryption regardless of bit length. The following are two examples: 1. Example1: An IPsec rule remote1 has phase 1 Encryption, Authentication, and Key Group set as 3DES, SHA1, and DH2. You cannot add new IPsec rule remote2 to have the same algorithm pair. You can change either one algorithm to make it unique, such as using 3DES, SHA1, and DH1 for remote2. 2. IPsec rule remote1 has phase1 Encryption, Authentication, and Key Group set as AES256, SHA1, and DH2. You cannot use AES128, SHA1, and DH2 to add new IPsec rule remote2 because AES is considered as the same regardless of bit length. SA Life Time Negotiation Mode Encryption Authentication Add Modify Note: When the default IPsec rule Default_L2TPVPN is enabled, if you want to add a new Remote Access IPsec rule, you can use phase 1 Encryption, Authentication, and Key Group pair DES, MD5, and DH2 or DES, SHA1, and DH2, or any algorithm combination with DH1 or DH5. Define the length of time before an IKE or IPSec SA automatically renegotiates in this field. It may range from 1 to 99,999 seconds. A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected. Select the negotiation mode to use to negotiate the IKE SA. Choices are: Main - this encrypts the Device's and remote IPSec router's identities but takes more time to establish the IKE SA. Aggressive - this is faster but does not encrypt the identities The Device and the remote IPSec router must use the same negotiation mode. Select which key size and encryption algorithm to use in the IKE SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm The Device and the remote IPSec router must use the same algorithms and keys. Longer keys require more processing power, resulting in increased latency and decreased throughput. Select which hash algorithm to use to authenticate packet data in the IKE SA. Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also slower. Click this to add phase 1 Encryption and Authentication. Select an entry and click the delete icon to remove it. SBG3300-N Series User's Guide 283

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442

Chapter 20 IPSec VPN
SBG3300-N Series User’s Guide
283
Phase 1
Phase 1
Encryption
and
Authentication
can have up to 3 algorithm pairs. You cannot
use phase 1
Encryption
,
Authentication
, and
Key Group
pairs that already exist in
other enabled IPsec rules with
Remote Access
selected as the
Application Scenario
.
AES is considered as the same encryption regardless of bit length. The following are
two examples:
1.
Example1: An IPsec rule
remote1
has phase 1
Encryption
,
Authentication
, and
Key Group
set as
3DES
,
SHA1
, and
DH2
. You cannot add new IPsec rule
remote2
to have the same algorithm pair. You can change either one algorithm to make it
unique, such as using
3DES
,
SHA1
, and
DH1
for
remote2
.
2.
IPsec rule
remote1
has phase1
Encryption
,
Authentication
, and
Key Group
set
as
AES256
,
SHA1
, and
DH2
. You cannot use
AES128
,
SHA1
, and
DH2
to add
new IPsec rule
remote2
because AES is considered as the same regardless of bit
length.
Note: When the default IPsec rule
Default_L2TPVPN
is enabled, if you want to add a
new
Remote Access IPsec
rule, you can use phase 1
Encryption
,
Authentication
, and
Key Group
pair
DES
,
MD5
, and
DH2
or
DES
,
SHA1
, and
DH2
, or any algorithm combination with
DH1
or
DH5
.
SA Life Time
Define the length of time before an IKE or IPSec SA automatically renegotiates in this
field. It may range from 1 to 99,999 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates,
all users accessing remote resources are temporarily disconnected.
Negotiation Mode
Select the negotiation mode to use to negotiate the IKE SA. Choices are:
Main
- this encrypts the Device’s and remote IPSec router’s identities but takes more
time to establish the IKE SA.
Aggressive
- this is faster but does not encrypt the identities
The Device and the remote IPSec router must use the same negotiation mode.
Encryption
Select which key size and encryption algorithm to use in the IKE SA.
Choices are:
DES
- a 56-bit key with the DES encryption algorithm
3DES
- a 168-bit key with the DES encryption algorithm
AES128
- a 128-bit key with the AES encryption algorithm
AES192
- a 192-bit key with the AES encryption algorithm
AES256
- a 256-bit key with the AES encryption algorithm
The Device and the remote IPSec router must use the same algorithms and keys.
Longer keys require more processing power, resulting in increased latency and
decreased throughput.
Authentication
Select which hash algorithm to use to authenticate packet data in the IKE SA. Choices
are
SHA1
and
MD5
.
SHA1
is generally considered stronger than
MD5
, but it is also
slower.
Add
Click this to add phase 1
Encryption
and
Authentication
.
Modify
Select an entry and click the delete icon to remove it.
Table 90
VPN > IPSec VPN > Setup > Edit (continued)
LABEL
DESCRIPTION