ZyXEL SBG3300-NB00 User Guide - Page 306
Table 103, Table 104
View all ZyXEL SBG3300-NB00 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 306 highlights
Chapter 22 L2TP VPN Device. The algorithms in red in Table 103 on page 306 indicate the ones that will be accepted based on Table 91 on page 286. Table 103 Phase 1 IPSec proposals provided by the built-in L2TP client in popular operating systems (Encryption/Authentication/Key Group) WINDOWS XP WINDOWS VISTA WINDOWS 7 IOS 5.1 ANDROID 4.1 1 3DES/SHA1/ 3DES/SHA1/ AES/SHA1/DH15 AES/SHA1/DH2 AES/SHA1/DH2 DH15 DH15 2 3DES/SHA1/DH2 3DES/SHA1/DH2 3DES/SHA1/ AES/MD5/DH2 AES/MD5/DH2 DH15 3 3DES/MD5/DH2 3DES/SHA1/DH2 3DES/SHA1/DH2 3DES/SHA1/DH2 4 DES/SHA1/DH1 3DES/MD5/DH2 3DES/MD5/DH2 5 DES/MD5/DH1 DES/SHA1/DH2 6 DES/MD5/DH2 After phase 1 tunnel is established, IPSec phase 2 negotiations begin. Table 104 on page 306 lists the IPSec phase 2 proposals provided by a built-in L2TP client in the popular operating systems. The first proposal that can be supported by the phase 2 setting in the Default_L2TPVPN IPSec VPN rule will be accepted by the Device. The algorithms in red in Table 104 on page 306 indicate the ones that will be accepted based on Table 91 on page 286. Table 104 Phase 2 IPSec proposals provided by the built-in L2TP client in popular operating systems (Tunnel Mode/Encryption/Authentication) [Encapsulation = Transport] WINDOWS XP WINDOWS VISTA WINDOWS 7 IOS 5.1 ANDROID 4.1 1 ESP/3DES/MD5 ESP/AES/SHA1 ESP/AES/SHA1 ESP/AES/SHA1 ESP/AES/SHA1 ESP/3DES/SHA1 ESP/AES/MD5 ESP/AES/MD5 ESP/3DES/SHA1 ESP/3DES/SHA1 ESP/3DES/MD5 ESP/3DES/MD5 ESP/DES/SHA1 2 AH/-/SHA1 and ESP/3DES/SHA1 ESP/3DES/SHA1 ESP/3DES/- 3 AH/-/MD5 and AH/-/SHA1 and ESP/DES/SHA1 ESP/3DES/- ESP/AES/- 4 AH/-/SHA1 and AH/-/SHA1 and ESP/-/SHA1 ESP/3DES/SHA1 ESP/3DES/- 5 AH/-/MD5 and AH/-/SHA1 and AH/-/SHA1 ESP/3DES/MD5 ESP/3DES/SHA1 6 ESP/DES/MD5 ESP/-/SHA1 ESP/DES/SHA1 AH/-/SHA1 ESP/DES/MD5 306 SBG3300-N Series User's Guide