ZyXEL SBG3300-NB00 User Guide - Page 284

Extended Authentication, IPSecVPN, Radius, Local DB, Extended Authentication XAUTH, Maintenance,

Page 284 highlights

Chapter 20 IPSec VPN Table 90 VPN > IPSec VPN > Setup > Edit (continued) LABEL Key Group DESCRIPTION Select which Diffie-Hellman key group (DHx) you want to use for encryption keys. Choices are: DH1 - use a 768-bit random number DH2 - use a 1024-bit random number DH5 - use a 1536-bit random number Dead Peer Detection (DPD) Extended Authentication (XAUTH) The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group. Select this check box if you want the Device to make sure the remote IPSec router is there before it transmits data through the IKE SA. The remote IPSec router must support DPD. If there has been no traffic for at least 15 seconds, the Device sends a message to the remote IPSec router. If the remote IPSec router responds, the Device transmits the data. If the remote IPSec router does not respond, the Device shuts down the IKE SA. When multiple IPSec routers use the same VPN tunnel to connect to a single VPN tunnel (telecommuters sharing a tunnel for example), use extended authentication to enforce a user name and password check. This way even though they all know the VPN tunnel's security settings, each still has to provide a unique user name and password. Select the checkbox if one of the routers (the Device or the remote IPSec router) verifies a user name and password from the other router using the local user database and/or an external server. Note: If you want to use Radius for Extended Authentication (XAUTH), you need to configure the settings in the VPN > IPSecVPN > Radius screen beforehand. See Section 20.6 on page 287. Server Mode Client Mode Phase 2 SA Life Time Tunnel Mode Note: If you want to use Local DB for Extended Authentication (XAUTH), make sure the user account exists in the Maintenance > User Account screen. Select this if the Device authenticates the user name and password from the remote IPSec router. You also have to select the authentication method, which specifies how the Device authenticates this information. Select this radio button if the Device provides a username and password to the remote IPSec router for authentication. You also have to provide the User Name and the Password. Phase 2 Encryption can have up to 3 different algorithms and Authentication can have up to 2 different algorithms. To add new algorithms, click the Add button next to Encryption or Authentication. Type the maximum number of seconds the IPSec SA can last. Shorter life times provide better security. The Device automatically negotiates a new IPSec SA before the current one expires, if there are users who are accessing remote resources. Select the security protocols used for an SA. Choices are: AH (RFC 2402) - provides integrity, authentication, sequence integrity (replay resistance), and non-repudiation but not encryption. If you select AH, you must select an Authentication algorithm. ESP (RFC 2406) - provides encryption and the same services offered by AH, but its authentication is weaker. If you select ESP, you must select an Encryption algorithm and Authentication algorithm. Both AH and ESP increase processing requirements and latency (delay). The Device and remote IPSec router must use the same active protocol. 284 SBG3300-N Series User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442

Chapter 20 IPSec VPN
SBG3300-N Series User’s Guide
284
Key Group
Select which Diffie-Hellman key group (DHx) you want to use for encryption keys.
Choices are:
DH1
- use a 768-bit random number
DH2
- use a 1024-bit random number
DH5
- use a 1536-bit random number
The longer the key, the more secure the encryption, but also the longer it takes to
encrypt and decrypt information. Both routers must use the same DH key group.
Dead Peer Detection
(DPD)
Select this check box if you want the Device to make sure the remote IPSec router is
there before it transmits data through the IKE SA. The remote IPSec router must
support DPD. If there has been no traffic for at least 15 seconds, the Device sends a
message to the remote IPSec router. If the remote IPSec router responds, the Device
transmits the data. If the remote IPSec router does not respond, the Device shuts down
the IKE SA.
Extended
Authentication
(XAUTH)
When multiple IPSec routers use the same VPN tunnel to connect to a single VPN tunnel
(telecommuters sharing a tunnel for example), use extended authentication to enforce
a user name and password check. This way even though they all know the VPN tunnel’s
security settings, each still has to provide a unique user name and password.
Select the checkbox if one of the routers (the Device or the remote IPSec router)
verifies a user name and password from the other router using the local user database
and/or an external server.
Note: If you want to use Radius for
Extended Authentication (
XAUTH
)
, you need to
configure the settings in the
VPN
>
IPSecVPN
>
Radius
screen beforehand. See
Section 20.6 on page 287
.
Note: If you want to use
Local DB
for
Extended Authentication (XAUTH)
, make sure
the user account exists in the
Maintenance
>
User Account
screen.
Server Mode
Select this if the Device authenticates the user name and password from the remote
IPSec router. You also have to select the authentication method, which specifies how
the Device authenticates this information.
Client Mode
Select this radio button if the Device provides a username and password to the remote
IPSec router for authentication. You also have to provide the
User Name
and the
Password
.
Phase 2
Phase 2
Encryption
can have up to 3 different algorithms and
Authentication
can
have up to 2 different algorithms. To add new algorithms, click the
Add
button next to
Encryption
or
Authentication
.
SA Life Time
Type the maximum number of seconds the IPSec SA can last. Shorter life times provide
better security. The Device automatically negotiates a new IPSec SA before the current
one expires, if there are users who are accessing remote resources.
Tunnel Mode
Select the security protocols used for an SA. Choices are:
AH
(RFC 2402) - provides integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not encryption. If you select
AH
, you must select
an
Authentication
algorithm.
ESP
(RFC 2406) - provides encryption and the same services offered by AH, but its
authentication is weaker. If you select
ESP
, you must select an
Encryption
algorithm
and Authentication algorithm.
Both
AH
and
ESP
increase processing requirements and latency (delay).
The Device and remote IPSec router must use the same active protocol.
Table 90
VPN > IPSec VPN > Setup > Edit (continued)
LABEL
DESCRIPTION