ZyXEL Router Prestige 334 User Manual
Here you can view all the pages of manual ZyXEL Router Prestige 334 User Manual. The ZyXEL manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 151
Prestige 334 User’s Guide Chapter 14 Introduction to IPSec 150 CHAPTER14 Introduction to IPSec This chapter introduces the basics of IPSec VPNs 14.1 VPN Overview A VPN (Virtual Private Network) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing technologies/services used to transport traffic over the Internet or any insecure network that uses the TCP/IP...
Page 152
Prestige 334 User’s Guide 151 Chapter 14 Introduction to IPSec Figure 56 Encryption and Decryption 14.1.3.2 Data Confidentiality The IPSec sender can encrypt packets before transmitting them across a network. 14.1.3.3 Data Integrity The IPSec receiver can validate packets sent by the IPSec sender to ensure that the data has not been altered during transmission. 14.1.3.4 Data Origin Authentication The IPSec receiver can verify the source of IPSec packets. This service depends on the data...
Page 153
Prestige 334 User’s Guide Chapter 14 Introduction to IPSec 152 Figure 57 IPSec Architecture 14.2.1 IPSec Algorithms The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms). The Encryption Algorithm describes the use of encryption techniques such as DES (Data Encryption Standard) and Triple DES algorithms. The Authentication...
Page 154
Prestige 334 User’s Guide 153 Chapter 14 Introduction to IPSec Figure 58 Transport and Tunnel Mode IPSec Encapsulation 14.3.1 Transport Mode Tr a n s p o r t mode is used to protect upper layer protocols and only affects the data in the IP packet. In Tr a n s p o r t mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP). With ESP, protection is applied only...
Page 155
Prestige 334 User’s Guide Chapter 14 Introduction to IPSec 154 NAT is incompatible with the AH protocol in both Tr a n s p o r t and Tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet. When using AH protocol, packet contents (the data payload) are not encrypted. A NAT device in between the IPSec endpoints will rewrite either the source or destination address with one of its own choosing. The VPN...
Page 157
Prestige 334 User’s Guide Chapter 15 VPN Screens156 CHAPTER15 VPN Screens This chapter introduces the VPN Web Configurator. See the Logs chapter for information on viewing logs and the Appendices for IPSec log descriptions. 15.1 VPN/IPSec Overview Use the screens documented in this chapter to configure rules for VPN connections and manage VPN connections. 15.2 IPSec Algorithms The ESP and AH protocols are necessary to create a Security Association (SA), the foundation of an IPSec VPN. An SA is...
Page 158
Prestige 334 User’s Guide 157Chapter 15 VPN Screens An added feature of the ESP is payload padding, which further protects communications by concealing the size of the packet being transmitted. 15.3 My IP Address My IP Address is the WAN IP address of the Prestige. If this field is configured as 0.0.0.0, then the Prestige will use the current Prestige WAN IP address (static or dynamic) to set up the VPN tunnel. The Prestige has to rebuild the VPN tunnel if the My IP Address changes after setup....
Page 159
Prestige 334 User’s Guide Chapter 15 VPN Screens158 15.4.1 Dynamic Secure Gateway Address If the remote secure gateway has a dynamic WAN IP address and does not use DDNS, enter 0.0.0.0 as the secure gateway’s address. In this case only the remote secure gateway can initiate SAs. This may be useful for telecommuters initiating a VPN tunnel to the company network. 15.5 Summary Screen The following figure helps explain the main fields in the web configurator. Figure 59 IPSec Summary Fields Local and...
Page 160
Prestige 334 User’s Guide 159Chapter 15 VPN Screens Figure 60 VPN: Summary The following table describes the labels in this screen. Table 47 VPN: Summary LABELDESCRIPTION #The VPN policy index number. ActiveThis field displays whether the VPN policy is active or not. A Y signifies that this VPN policy is active. N signifies that this VPN policy is not active. Local Addr.This is the IP address of the computer on your local network behind your Prestige. Remote Addr.This is the IP address(es) of...