Prestige 2602HWNLI-D7A Support Notes
All contents copyright (c) 2007 ZyXEL Communications Corporation.
204
provides cryptographic security services. These services allow for authentication, integrity, access control,
and confidentiality. IPSec allows for the information exchanged between remote sites to be encrypted and
verified. You can create encrypted tunnels (VPNs), or just do encryption between computers. Since you
have so many options, IPSec is truly the most extensible and complete network security solution.
What secure protocols does IPSec support?
There are two protocols provided by IPSec, they are AH (Authentication Header, protocol number 51)
and ESP (Encapsulated Security Payload, protocol number 50).
What are the differences between 'Transport mode' and 'Tunnel mode?
The IPSec protocols (AH and ESP) can be used to protect either an entire IP payload or only the
upper-layer protocols of an IP payload. Transport mode is mainly for an IP host to protect the data
generated locally, while tunnel mode is for security gateway to provide IPSec service for other machines
lacking of IPSec capability.
In this case, Transport mode only protects the upper-layer protocols of IP payload (user data). Tunneling
mode protects the entire IP payload including user data.
There is no restriction that the IPSec hosts and the security gateway must be separate machines. Both
IPSec protocols, AH and ESP, can operate in either transport mode and tunnel mode.
What is SA?
A Security Association (SA) is a contract between two parties indicating what security parameters, such
as keys and algorithms they will use.
What is IKE?
IKE is short for Internet Key Exchange. Key Management allows you to determine whether to use IKE
(ISAKMP) or manual key configuration to set up a VPN.
There are two phases in every IKE negotiation- phase 1 (Authentication) and phase 2 (Key Exchange).
Phase 1 establishes an IKE SA and phase 2 uses that SA to negotiate SAs for IPSec.