ZyXEL P-661H-D1 User Guide - Page 227

Security > VPN > Setup > Edit > Advanced Setup continued, Table 59

Page 227 highlights

Chapter 16 VPN Table 59 Security > VPN > Setup > Edit > Advanced Setup (continued) LABEL DESCRIPTION DH You must choose a key group for phase 1 setup. DH2 refers to Diffie- Hellman Group 2, a 1024-bit random number. DH5 refers to Diffie- Hellman Group5, a 1536-bit random number, and DH14 refers to Diffie-Hellman Group 14, providing 2048 bits of key strength. SA Life Time (Seconds) Define the length of time before an IPSec SA automatically renegotiates in this field. It may range from 60 to 3,000,000 seconds (almost 35 days). Phase 2 Encryption Algorithm A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected. Select 3DES, AES-128 or AES-256 from the drop-down list box. When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. Authentication Algorithm SA Life Time (Seconds) This implementation of AES uses a 128-bit key and a 256-bit key. AES is faster than 3DES. Select MD5, SHA1, SHA2-256 or SHA2-512 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) and SHA2 are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for more security. SHA2-256 or SHA2-512 are part of the SHA2 set of cryptographic functions and they are considered even more secure than MD5 and SHA1. Define the length of time before an IKE SA automatically renegotiates in this field. It may range from 60 to 3,000,000 seconds (almost 35 days). Perfect Forward Secrecy (PFS) A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected. Perfect Forward Secrecy (PFS) is disabled (NONE) by default in phase 2 IPSec SA setup. This allows faster IPSec setup, but is not so secure. Choose DH2, DH5 or DH14 from the drop-down list box to enable PFS. DH2 refers to Diffie-Hellman Group 2, a 1024-bit random number. DH5 refers to Diffie-Hellman Group5, a 1536-bit random number, and DH14 refers to Diffie-Hellman Group 14, providing 2048 bits of key strength. P-661HNU-Fx User's Guide 227

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404

Chapter 16 VPN
P-661HNU-Fx User’s Guide
227
DH
You must choose a key group for phase 1 setup.
DH2
refers to Diffie-
Hellman Group 2, a 1024-bit random number.
DH5
refers to Diffie-
Hellman Group5, a 1536-bit random number, and
DH14
refers to
Diffie-Hellman Group 14, providing 2048 bits of key strength.
SA Life Time
(Seconds)
Define the length of time before an IPSec SA automatically
renegotiates in this field. It may range from 60 to 3,000,000 seconds
(almost 35 days).
A short SA Life Time increases security by forcing the two VPN
gateways to update the encryption and authentication keys. However,
every time the VPN tunnel renegotiates, all users accessing remote
resources are temporarily disconnected.
Phase 2
Encryption
Algorithm
Select
3DES,
AES-128
or
AES-256
from the drop-down list box.
When you use one of these encryption algorithms for data
communications, both the sending device and the receiving device
must use the same secret key, which can be used to encrypt and
decrypt the message or to generate and verify a message
authentication code. The
DES
encryption algorithm uses a 56-bit key.
Triple DES (
3DES
) is a variation on
DES
that uses a 168-bit key. As a
result,
3DES
is more secure than
DES
. It also requires more
processing power, resulting in increased latency and decreased
throughput.
This implementation of AES uses a
128
-bit key and a
256
-bit key.
AES
is faster than
3DES
.
Authentication
Algorithm
Select
MD5
,
SHA1
,
SHA2-256
or
SHA2-512
from the drop-down list
box.
MD5
(Message Digest 5) and
SHA1
(Secure Hash Algorithm) and
SHA2
are hash algorithms used to authenticate packet data. The
SHA1
algorithm is generally considered stronger than
MD5
, but is
slower. Select
MD5
for minimal security and
SHA-1
for more security.
SHA2-256
or
SHA2-512
are part of the SHA2 set of cryptographic
functions and they are considered even more secure than
MD5
and
SHA1
.
SA Life Time
(Seconds)
Define the length of time before an IKE SA automatically renegotiates
in this field. It may range from 60 to 3,000,000 seconds (almost 35
days).
A short SA Life Time increases security by forcing the two VPN
gateways to update the encryption and authentication keys. However,
every time the VPN tunnel renegotiates, all users accessing remote
resources are temporarily disconnected.
Perfect Forward
Secrecy (PFS)
Perfect Forward Secrecy (PFS) is disabled (
NONE
) by default in phase
2 IPSec SA setup. This allows faster IPSec setup, but is not so secure.
Choose
DH2
,
DH5
or
DH14
from the drop-down list box to enable
PFS.
DH2
refers to Diffie-Hellman Group 2, a 1024-bit random number.
DH5
refers to Diffie-Hellman Group5, a 1536-bit random number, and
DH14
refers to Diffie-Hellman Group 14, providing 2048 bits of key
strength.
Table 59
Security > VPN > Setup > Edit > Advanced Setup (continued)
LABEL
DESCRIPTION