ZyXEL Communications 652H/HW User Manual

Page of 36
Prestige 652H/HW 
33 
Table 10 VPN IKE 
LABEL DESCRIPTION 
Authentication 
Algorithm 
Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 
(Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The 
SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 
for minimal security and SHA-1 for maximum security.  
Advanced Click 
Advanced to configure more detailed settings of your IKE key management. 
Delete Click 
Delete to remove this rule. 
5.12 Viewing SA Monitor 
A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This 
screen displays active VPN connections. Use Refresh to display active VPN connections. This 
screen is read-only. 
From the main screen, click Advanced Setup, and Monitor to view Security Associations.  
When there is outbound traffic but no inbound traffic, the SA times out 
automatically after two minutes. A tunnel with no outbound or inbound 
traffic is "idle" and does not timeout until the SA lifetime period expires.  
 
5.13 UPnP Overview 
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for 
simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a 
network, obtain an IP address, convey its capabilities and learn about other devices on the network. 
In turn, a device can leave a network smoothly and automatically when it is no longer in use. 
All UPnP-enabled devices may communicate freely with each other without additional 
configuration. Disable UPnP if this is not your intention.  
Windows ME and Windows XP support UPnP. See the Microsoft website for information about 
other Microsoft operating systems. 
Make sure you apply Microsoft’s UPnP security patch before enabling the 
UPnP feature. Refer to the Microsoft website.  
5.14 Configuring UPnP 
Click Advanced Setup and then UPnP to open the UPnP screen.