ZyXEL SBG3300-NB00 User Guide - Page 285

Table 90, Label, Description

Page 285 highlights

Chapter 20 IPSec VPN Table 90 VPN > IPSec VPN > Setup > Edit (continued) LABEL Encapsulation DESCRIPTION Select which type of encapsulation the IPSec SA uses. Choices are: Tunnel - this mode encrypts the IP header information and the data. Transport - this mode only encrypts the data. If you set Encapsulation to Transport, Policy (Local and Remote) is not applicable. Encryption The Device and remote IPSec router must use the same encapsulation. Select which key size and encryption algorithm to use in the IKE SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm Authentication Perfect Forward Secrecy (PFS) The Device and the remote IPSec router must use the same algorithms and keys. Longer keys require more processing power, resulting in increased latency and decreased throughput. Select which hash algorithm to use to authenticate packet data in the IKE SA. Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also slower. Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if you do, which Diffie-Hellman key group to use for encryption. Choices are: DH1 - enable PFS and use a 768-bit random number DH2 - enable PFS and use a 1024-bit random number DH5 - enable PFS and use a 1536-bit random number Policy PFS changes the root key that is used to generate encryption keys for each IPSec SA. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group. You cannot use a Policy (Local and Remote pair) that already exists in other enabled IPsec rules with Site-to-Site or Site-to-Site with Dynamic Peer as the Application Scenario. The following are two examples: 1. Example1: IPsec rule vpn1 has Local Policy set as 192.168.1.0 / 255.255.255.0 and Remote Policy as 10.10.1.0 / 255.255.255.0. You cannot use the same policy configuration for other IPSec rules. However, you can set Local Policy as 192.168.1.0 / 255.255.255.0 and Remote Policy as 192.168.200.0 / 255.255.255.0 for a new IPSec rule vpn2. Local/Remote IP Type 2. Example2: IPSec rule vpn1 has Local Policy set as 192.168.1.100 and Remote Policy as 10.10.1.33. You cannot use the same policy configuration for other IPSec rules. However, you can set Local Policy as 192.168.1.100 and Remote Policy as 10.10.1.34 for a new IPSec rule vpn2. Use the drop-down list box to choose Single, Range or Subnet. Select Single for a single IP address. Select Range to enter a range of IP addresses in the Local/Remote IP Address Start and Local/Remote IP Address End fields. Select Subnet to specify IP addresses on a network by their subnet mask. SBG3300-N Series User's Guide 285

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442

Chapter 20 IPSec VPN
SBG3300-N Series User’s Guide
285
Encapsulation
Select which type of encapsulation the IPSec SA uses. Choices are:
Tunnel
- this mode encrypts the IP header information and the data.
Transport
- this mode only encrypts the data. If you set
Encapsulation
to
Transport
, Policy (Local and Remote) is not applicable.
The Device and remote IPSec router must use the same encapsulation.
Encryption
Select which key size and encryption algorithm to use in the IKE SA.
Choices are:
DES
- a 56-bit key with the DES encryption algorithm
3DES
- a 168-bit key with the DES encryption algorithm
AES128
- a 128-bit key with the AES encryption algorithm
AES192
- a 192-bit key with the AES encryption algorithm
AES256
- a 256-bit key with the AES encryption algorithm
The Device and the remote IPSec router must use the same algorithms and keys.
Longer keys require more processing power, resulting in increased latency and
decreased throughput.
Authentication
Select which hash algorithm to use to authenticate packet data in the IKE SA. Choices
are
SHA1
and
MD5
.
SHA1
is generally considered stronger than
MD5
, but it is also
slower.
Perfect Forward
Secrecy (PFS)
Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if you do,
which Diffie-Hellman key group to use for encryption. Choices are:
DH1
- enable PFS and use a 768-bit random number
DH2
- enable PFS and use a 1024-bit random number
DH5
- enable PFS and use a 1536-bit random number
PFS changes the root key that is used to generate encryption keys for each IPSec SA.
The longer the key, the more secure the encryption, but also the longer it takes to
encrypt and decrypt information. Both routers must use the same DH key group.
Policy
You cannot use a Policy (Local and Remote pair) that already exists in other enabled
IPsec rules with
Site-to-Site
or
Site-to-Site with Dynamic Peer
as the
Application
Scenario
. The following are two examples:
1.
Example1: IPsec rule
vpn1
has
Local Policy
set as 192.168.1.0 / 255.255.255.0
and
Remote Policy
as 10.10.1.0 / 255.255.255.0. You cannot use the same policy
configuration for other IPSec rules. However, you can set
Local Policy
as
192.168.1.0 / 255.255.255.0 and
Remote Policy
as
192.168.200.0 /
255.255.255.0 for a new IPSec rule
vpn2
.
2.
Example2: IPSec rule
vpn1
has
Local Policy
set as 192.168.1.100 and
Remote
Policy
as 10.10.1.33. You cannot use the same policy configuration for other IPSec
rules. However, you can set
Local Policy
as 192.168.1.100 and
Remote Policy
as
10.10.1.34 for a new IPSec rule
vpn2
.
Local/Remote IP
Type
Use the drop-down list box to choose
Single
,
Range
or
Subnet
. Select
Single
for a
single IP address. Select
Range
to enter a range of IP addresses in the
Local/Remote
IP Address Start
and
Local/Remote IP Address End
fields. Select
Subnet
to
specify IP addresses on a network by their subnet mask.
Table 90
VPN > IPSec VPN > Setup > Edit (continued)
LABEL
DESCRIPTION