Home > ZyXEL > Router > ZyXEL Router Prestige 334 User Manual

ZyXEL Router Prestige 334 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Prestige 334 User’s Guide
    Chapter 15 VPN Screens170
    Figure 66   VPN IKE: Advanced 
    						
    							Prestige 334 User’s Guide
    171Chapter 15 VPN Screens
    The following table describes the labels in this screen.
    Table 52   VPN IKE: Advanced
    LABELDESCRIPTION
    Active Select this check box to activate this VPN policy.
    Keep AliveSelect this check box to turn on the Keep Alive feature for this SA. 
    Turn on Keep Alive to have the Prestige automatically reinitiate the SA after 
    the SA lifetime times out, even if there is no traffic. The remote IPSec router 
    must also have keep alive enabled in order for this feature to work. 
    NAT TraversalSelect this check box to enable NAT traversal. NAT traversal allows you to set 
    up a VPN connection when there are NAT routers between the two IPSec 
    routers.
    The remote IPSec router must also have NAT traversal enabled. 
    You can use NAT traversal with ESP protocol using Transport or Tu n n e l  
    mode, but not with AH protocol nor with manual key management. In order for 
    an IPSec router behind a NAT router to receive an initiating IPSec packet, set 
    the NAT router to forward UDP port 500 to the IPSec router behind the NAT 
    router.
    IPSec Keying Mode The advanced configuration page is only available with the IKE IPSec keying 
    mode. 
    Click the Basic button below in order to be able to choose the Manual IPSec 
    keying mode. 
    Make sure the remote gateway has the same configuration in this field.
    Protocol Number Enter 1 for ICMP, 6 for TCP, 17 for UDP, etc. 0 is the default and signifies any 
    protocol. 
    Enable Replay 
    Detection As a VPN setup is processing intensive, the system is vulnerable to Denial of 
    Service (DOS) attacks The IPSec receiver can detect and reject old or 
    duplicate packets to protect against replay attacks. Enable replay detection by 
    setting this field to Ye s. 
    Local Address The local IP address must be static and correspond to the remote IPSec 
    routers configured remote IP addresses. 
    Two active SAs can have the same local or remote IP address, but not both. 
    You can configure multiple SAs between the same local and remote IP 
    addresses, as long as only one is active at any time.
    Local Port Start 0 is the default and signifies any port. Type a port number from 0 to 65535. 
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, 
    HTTP; 25, SMTP; 110, POP3 
    Local Port End Enter a port number in this field to define a port range. This port number must 
    be greater than that specified in the previous field (or equal to it for configuring 
    an individual port). 
    Remote Address Start Remote IP addresses must be static and correspond to the remote IPSec 
    routers configured local IP addresses. The remote address fields do not apply 
    when the Secure Gateway Address field is configured to 0.0.0.0. In this case 
    only the remote IPSec router can initiate the VPN.
    Two active SAs cannot have the local and remote IP address(es) both the 
    same. Two active SAs can have the same local or remote IP address, but not 
    both. You can configure multiple SAs between the same local and remote IP 
    addresses, as long as only one is active at any time.
    Enter a (static) IP address on the network behind the remote IPSec router. 
    						
    							Prestige 334 User’s Guide
    Chapter 15 VPN Screens172
    Remote Address End/
    MaskWhen the remote IP address is a single address, type it a second time here.
    When the remote IP address is a range, enter the end (static) IP address, in a 
    range of computers on the network behind the remote IPSec router.
    When the remote IP address is a subnet address, enter a subnet mask on the 
    network behind the remote IPSec router.
    Remote Port Start 0 is the default and signifies any port. Type a port number from 0 to 65535. 
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, 
    HTTP; 25, SMTP; 110, POP3 
    Remote Port End Enter a port number in this field to define a port range. This port number must 
    be greater than that specified in the previous field (or equal to it for configuring 
    an individual port). 
    DNS Server (for IPSec 
    VPN)If there is a private DNS server that services the VPN, type its IP address here. 
    The Prestige assigns this additional DNS server to the Prestige’s DHCP 
    clients that have IP addresses in this IPSec rules range of local addresses. A 
    DNS server allows clients on the VPN to find other computers and servers on 
    the VPN by their (private) domain names.
    My IP Address Enter the WAN IP address of your Prestige. The Prestige uses its current WAN 
    IP address (static or dynamic) in setting up the VPN tunnel if you leave this 
    field as 0.0.0.0. The VPN tunnel has to be rebuilt if this IP address changes. 
    Local ID TypeSelect IP to identify this Prestige by its IP address. 
    Select DNS to identify this Prestige by a domain name.
    Select E-mail to identify this Prestige by an e-mail address. 
    Local ContentWhen you select IP in the Local ID Type field, type the IP address of your 
    computer in the local Content field. The Prestige automatically uses the IP 
    address in the My IP Address field (refer to the My IP Address field 
    description) if you configure the local Content field to 0.0.0.0 or leave it blank. 
    It is recommended that you type an IP address other than 0.0.0.0 in the local 
    Content field or use the DNS or E-mail ID type in the following situations.
    • When there is a NAT router between the two IPSec routers. 
    • When you want the remote IPSec router to be able to distinguish between 
    VPN connection requests that come in from IPSec routers with dynamic 
    WAN IP addresses. 
    When you select DNS or E-mail in the Local ID Type field, type a domain 
    name or e-mail address by which to identify this Prestige in the local Content 
    field. Use up to 31 ASCII characters including spaces, although trailing spaces 
    are truncated. The domain name or e-mail address is for identification 
    purposes only and can be any string.
    Secure Gateway 
    Address Type the WAN IP address or the URL (up to 31 characters) of the remote 
    secure gateway with which youre making the VPN connection. Set this field to 
    0.0.0.0 if the remote secure gateway has a dynamic WAN IP address (the 
    IPSec Keying Mode field must be set to IKE). 
    Peer ID TypeSelect IP to identify the remote IPSec router by its IP address.
    Select DNS to identify the remote IPSec router by a domain name.
    Select E-mail to identify the remote IPSec router by an e-mail address.
    Table 52   VPN IKE: Advanced
    LABELDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    173Chapter 15 VPN Screens
    Peer ContentThe configuration of the peer content depends on the peer ID type.
    •For IP, type the IP address of the computer with which you will make the 
    VPN connection. If you configure this field to 0.0.0.0 or leave it blank, the 
    Prestige will use the address in the Secure Gateway Address field (refer 
    to the Secure Gateway Address field description).
    •For DNS or E-mail, type a domain name or e-mail address by which to 
    identify the remote IPSec router. Use up to 31 ASCII characters including 
    spaces, although trailing spaces are truncated. The domain name or e-mail 
    address is for identification purposes only and can be any string.
    It is recommended that you type an IP address other than 0.0.0.0 or use the 
    DNS or E-mail ID type in the following situations:
    • When there is a NAT router between the two IPSec routers. 
    When you want the Prestige to distinguish between VPN connection requests 
    that come in from remote IPSec routers with dynamic WAN IP addresses.
    IKE Phase 1 A phase 1 exchange establishes an IKE SA (Security Association). 
    Negotiation Mode Select Main or Aggressive from the drop-down list box. The Prestiges 
    negotiation mode should be identical to that on the remote secure gateway. 
    Encryption Algorithm Select DES or 3DES from the drop-down list box. The Prestiges encryption 
    algorithm should be identical to the secure remote gateway. When DES is 
    used for data communications, both sender and receiver must know the same 
    secret key, which can be used to encrypt and decrypt the message. The DES 
    encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on 
    DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It 
    also requires more processing power, resulting in increased latency and 
    decreased throughput. 
    Authentication 
    Algorithm Select SHA1 or MD5 from the drop-down list box. The Prestiges 
    authentication algorithm should be identical to the secure remote gateway. 
    MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash 
    algorithms used to authenticate the source and integrity of packet data. The 
    SHA1 algorithm is generally considered stronger than MD5, but is slower. 
    Select SHA-1 for maximum security. 
    SA Life Time Define the length of time before an IKE SA automatically renegotiates in this 
    field. It may range from 60 to 3,000,000 seconds (almost 35 days). A short SA 
    Life Time increases security by forcing the two VPN gateways to update the 
    encryption and authentication keys. However, every time the VPN tunnel 
    renegotiates, all users accessing remote resources are temporarily 
    disconnected. 
    Key Group You must choose a key group for phase 1 IKE setup. DH1 (default) refers to 
    Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman 
    Group 2 a 1024 bit (1Kb) random number. 
    Pre-Shared Key Type your pre-shared key in this field. A pre-shared key identifies a 
    communicating party during a phase 1 IKE negotiation. It is called pre-
    shared because you have to share it with another party before you can 
    communicate with them over a secure connection. 
    IKE Phase 2 A phase 2 exchange uses the IKE SA established in phase 1 to negotiate the 
    SA for IPSec. 
    Encapsulation Mode Select Tu n n e l  mode or Tr a n s p o r t  mode from the drop down list-box. The 
    Prestiges encapsulation mode should be identical to the secure remote 
    gateway. 
    Table 52   VPN IKE: Advanced
    LABELDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    Chapter 15 VPN Screens174
    15.13  Manual Key Setup
    Manual key management is useful if you have problems with IKE key management.
    IPSec Protocol Select ESP or AH from the drop-down list box. The Prestiges IPSec Protocol 
    should be identical to the secure remote gateway. The ESP (Encapsulation 
    Security Payload) protocol (RFC 2406) provides encryption as well as the 
    authentication offered by AH. If you select ESP here, you must select options 
    from the Encryption Algorithm and Authentication Algorithm fields (described 
    below). The AH protocol (Authentication Header Protocol) (RFC 2402) was 
    designed for integrity, authentication, sequence integrity (replay resistance), 
    and non-repudiation but not for confidentiality, for which the ESP was 
    designed. If you select AH here, you must select options from the 
    Authentication Algorithm field. 
    Encryption Algorithm The encryption algorithm for the Prestige and the secure remote gateway 
    should be identical. When DES is used for data communications, both sender 
    and receiver must know the same secret key, which can be used to encrypt 
    and decrypt the message. The DES encryption algorithm uses a 56-bit key. 
    Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 
    3DES is more secure than DES. It also requires more processing power, 
    resulting in increased latency and decreased throughput. 
    Authentication 
    Algorithm Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) 
    and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate 
    packet data. The SHA1 algorithm is generally considered stronger than MD5, 
    but is slower. Select MD5 for minimal security and SHA-1 for maximum 
    security. 
    SA Life Time Define the length of time before an IKE SA automatically renegotiates in this 
    field. It may range from 60 to 3,000,000 seconds (almost 35 days). A short SA 
    Life Time increases security by forcing the two VPN gateways to update the 
    encryption and authentication keys. However, every time the VPN tunnel 
    renegotiates, all users accessing remote resources are temporarily 
    disconnected. 
    Perfect Forward 
    Secrecy (PFS) Perfect Forward Secrecy (PFS) is disabled (None) by default in phase 2 IPSec 
    SA setup. This allows faster IPSec setup, but is not so secure. Choose from 
    DH1 or DH2 to enable PFS. DH1 refers to Diffie-Hellman Group 1, a 768 bit 
    random number. DH2 refers to Diffie-Hellman Group 2, a 1024 bit (1Kb) 
    random number (more secure, yet slower). 
    BasicSelect Basic to go to the previous VPN configuration screen.
    ApplyClick Apply to save your changes. 
    ResetClick Reset to begin configuring this screen afresh.
    Table 52   VPN IKE: Advanced
    LABELDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    175Chapter 15 VPN Screens
    15.13.1  Security Parameter Index (SPI)
    An SPI is used to distinguish different SAs terminating at the same destination and using the 
    same IPSec protocol. This data allows for the multiplexing of SAs to a single gateway. The 
    SPI (Security Parameter Index) along with a destination IP address uniquely identify a 
    particular Security Association (SA). The SPI is transmitted from the remote VPN gateway to 
    the local VPN gateway. The local VPN gateway then uses the network, encryption and key 
    values that the administrator associated with the SPI to establish the tunnel.
    15.14  Configuring Manual Key
    You only configure VPN Manual Key when you select Manual in the IPSec Keying Mode 
    field on the Rule Setup IKE screen. This is the Rule Setup Manual screen as shown next.  
    Note: Current ZyXEL implementation assumes identical 
    outgoing and incoming SPIs 
    						
    							Prestige 334 User’s Guide
    Chapter 15 VPN Screens176
    Figure 67   Setup: Manual
    The following table describes the labels in this screen.
    Table 53   Rule Setup: Manual
    LABELDESCRIPTION
    Active Select this check box to activate this VPN policy.
    IPSec Keying ModeSelect IKE or Manual from the drop-down list box. Manual is a useful option 
    for troubleshooting if you have problems using IKE key management. 
    Protocol NumberEnter 1 for ICMP, 6 for TCP, 17 for UDP, etc. 0 is the default and signifies any 
    protocol.
    Local AddressThe Local IP address must be static and correspond to the remote IPSec 
    routers configured remote IP addresses. 
    Two active SAs can have the same local or remote IP address, but not both. 
    You can configure multiple SAs between the same local and remote IP 
    addresses, as long as only one is active at any time.
    Local Port Start0 is the default and signifies any port. Type a port number from 0 to 65535. 
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, 
    HTTP; 25, SMTP; 110, POP3. 
    						
    							Prestige 334 User’s Guide
    177Chapter 15 VPN Screens
    Local Port EndType a port number in this field to define a port range. This port number must 
    be greater than that specified in the previous field. If Local Port Start is left at 
    0, Local Port End will also remain at 0.
    Remote Address StartRemote IP addresses must be static and correspond to the remote IPSec 
    routers configured local IP addresses. The remote address fields do not 
    apply when the Secure Gateway IP Address field is configured to 0.0.0.0. In 
    this case only the remote IPSec router can initiate the VPN.
    Two active SAs cannot have the local and remote IP address(es) both the 
    same. Two active SAs can have the same local or remote IP address, but not 
    both. You can configure multiple SAs between the same local and remote IP 
    addresses, as long as only one is active at any time.
    Enter a (static) IP address on the network behind the remote IPSec router.
    Remote Address End/
    MaskWhen the remote IP address is a single address, type it a second time here.
    When the remote IP address is a range, enter the end (static) IP address, in a 
    range of computers on the network behind the remote IPSec router.
    When the remote IP address is a subnet address, enter a subnet mask on the 
    network behind the remote IPSec router. 
    Remote Port Start0 is the default and signifies any port. Type a port number from 0 to 65535. 
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, 
    HTTP; 25, SMTP; 110, POP3.
    Remote Port EndEnter a port number in this field to define a port range. This port number must 
    be greater than that specified in the previous field. If Remote Port Start is left 
    at 0, Remote Port End will also remain at 0.
    DNS Server (for IPSec 
    VPN)If there is a private DNS server that services the VPN, type its IP address 
    here. The Prestige assigns this additional DNS server to the Prestige’s DHCP 
    clients that have IP addresses in this IPSec rules range of local addresses. A 
    DNS server allows clients on the VPN to find other computers and servers on 
    the VPN by their (private) domain names.
    My IP AddressEnter the WAN IP address of your Prestige. The Prestige uses its current 
    WAN IP address (static or dynamic) in setting up the VPN tunnel if you leave 
    this field as 0.0.0.0. The VPN tunnel has to be rebuilt if this IP address 
    changes.
    Secure Gateway IP 
    AddressType the WAN IP address or the URL (up to 31 characters) of the IPSec 
    router with which youre making the VPN connection. 
    SPIType a number (base 10) from 1 to 999999 for the Security Parameter Index. 
    Encapsulation ModeSelect Tu n n e l mode or Transport mode from the drop-down list box.
    Enable Replay 
    DetectionAs a VPN setup is processing intensive, the system is vulnerable to Denial of 
    Service (DoS) attacks The IPSec receiver can detect and reject old or 
    duplicate packets to protect against replay attacks. Select YES from the drop-
    down menu to enable replay detection, or select NO to disable it.
    IPSec ProtocolSelect ESP if you want to use ESP (Encapsulation Security Payload). The 
    ESP protocol (RFC 2406) provides encryption as well as some of the services 
    offered by AH. If you select ESP here, you must select options from the 
    Encryption Algorithm and Authentication Algorithm fields (described 
    next).
    Select AH if you want to use AH (Authentication Header Protocol). The AH 
    protocol (RFC 2402) was designed for integrity, authentication, sequence 
    integrity (replay resistance), and non-repudiation but not for confidentiality, for 
    which the ESP was designed. If you select AH here, you must select options 
    from the Authentication Algorithm field (described later).
    Table 53   Rule Setup: Manual
    LABELDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    Chapter 15 VPN Screens178
    15.15  Viewing SA Monitor
    In the web configurator, click VPN and the SA Monitor tab. Use this screen to display and 
    manage active VPN connections.
    A Security Association (SA) is the group of security settings related to a specific VPN tunnel. 
    This screen displays active VPN connections. Use Refresh to display active VPN 
    connections. This screen is read-only. The following table describes the labels in this tab.
    Encryption AlgorithmSelect DES or 3DES from the drop-down list box. The Prestiges encryption 
    algorithm should be identical to the secure remote gateway. When DES is 
    used for data communications, both sender and receiver must know the same 
    secret key, which can be used to encrypt and decrypt the message. The DES 
    encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on 
    DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It 
    also requires more processing power, resulting in increased latency and 
    decreased throughput.
    Authentication 
    AlgorithmSelect SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) 
    and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate 
    packet data. The SHA1 algorithm is generally considered stronger than MD5, 
    but is slower. Select MD5 for minimal security and SHA-1 for maximum 
    security. 
    Encryption Key (Only 
    with ESP)With DES, type a unique key 8 characters long. With 3DES, type a unique 
    key 24 characters long. Any characters may be used, including spaces, but 
    trailing spaces are truncated.
    Authentication KeyType a unique authentication key to be used by IPSec if applicable. Enter 16 
    characters for MD5 authentication or 20 characters for SHA-1 authentication. 
    Any characters may be used, including spaces, but trailing spaces are 
    truncated.
    ApplyClick Apply to save your changes back to the Prestige.
    ResetClick Reset to begin configuring this screen afresh.
    Table 53   Rule Setup: Manual
    LABELDESCRIPTION
    Note: When there is outbound traffic but no inbound traffic, the 
    SA times out automatically after two minutes. A tunnel with no 
    outbound or inbound traffic is idle and does not timeout until 
    the SA lifetime period expires.See the Keep Alive section  to 
    have the Prestige renegotiate an IPSec SA when the SA 
    lifetime expires, even if there is no traffic. 
    						
    							Prestige 334 User’s Guide
    179Chapter 15 VPN Screens
    Figure 68   SA Monitor
    The following table describes the labels in this screen.
    15.16  Configuring Global Setting
    To change your Prestige’s Global Settings, click VPN, then the Global Setting tab. The 
    screen appears as shown.
    Table 54   SA Monitor 
    LABELDESCRIPTION
    #This is the security association index number. 
    NameThis field displays the identification name for this VPN policy.
    EncapsulationThis field displays Tunnel or Transport mode. 
    IPSec AlgorithmThis field displays the security protocols used for an SA. 
    Both AH and ESP increase Prestige processing requirements and 
    communications latency (delay).
    Previous Page      
    (If applicable)Click Previous Page to view more items in the summary.
    RefreshClick Refresh to display the current active VPN connection(s). 
    Next Page            
    (If applicable)Click Next Page to view more items in the summary. 
    						
    All ZyXEL manuals Comments (0)