ZyXEL Communications P-662H User Manual

Page of 496
P-662H/HW-D Series User’s Guide
Chapter 16 VPN Screens
251
Peer ID Type Select IP to identify the remote IPSec router by its IP address.
Select DNS to identify the remote IPSec router by a domain name.
Select E-mail to identify the remote IPSec router by an e-mail address.
Content The configuration of the peer content depends on the peer ID type.
For IP, type the IP address of the computer with which you will make the VPN 
connection. If you configure this field to 0.0.0.0 or leave it blank, the ZyXEL 
Device will use the address in the Secure Gateway Address field (refer to the 
Secure Gateway Address field description).
For DNS or E-mail, type a domain name or e-mail address by which to identify the 
remote IPSec router. Use up to 31 ASCII characters including spaces, although 
trailing spaces are truncated. The domain name or e-mail address is for 
identification purposes only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the DNS 
or E-mail ID type in the following situations:
When there is a NAT router between the two IPSec routers. 
When you want the ZyXEL Device to distinguish between VPN connection 
requests that come in from remote IPSec routers with dynamic WAN IP 
addresses.
Secure Gateway
Address
Type the WAN IP address or the URL (up to 31 characters) of the IPSec router 
with which you're making the VPN connection. Set this field to 0.0.0.0 if the 
remote IPSec router has a dynamic WAN IP address (the Key Management field 
must be set to IKE).
In order to have more than one active rule with the Secure Gateway Address 
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between 
rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field 
and the LAN’s full IP address range as the local IP address, then you cannot 
configure any other active rules with the Secure Gateway Address field set to 
0.0.0.0.
Security Protocol
VPN Protocol Select ESP if you want to use ESP (Encapsulation Security Payload). The ESP 
protocol (RFC 2406) provides encryption as well as some of the services offered 
by AH. If you select ESP here, you must select options from the Encryption 
Algorithm and Authentication Algorithm fields (described below).
Pre-Shared Key Type your pre-shared key in this field. A pre-shared key identifies a 
communicating party during a phase 1 IKE negotiation. It is called "pre-shared" 
because you have to share it with another party before you can communicate with 
them over a secure connection. 
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal 
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x” (zero 
x), which is not counted as part of the 16 to 62 character range for the key. For 
example, in "0x0123456789ABCDEF", “0x” denotes that the key is hexadecimal 
and “0123456789ABCDEF” is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will receive 
a “PYLD_MALFORMED” (payload malformed) packet if the same pre-shared key 
is not used on both ends.
Certificate Select the Certificate radio button to identify the ZyXEL Device by a certificate.
Use the drop-down list box to select the certificate to use for this VPN tunnel. You 
must have certificates already configured in the My Certificates screen. Click My 
Certificates to go to the My Certificates screen where you can view the ZyXEL 
Device's list of certificates.
Table 94   Edit VPN Policies
LABEL
DESCRIPTION