ZyXEL Communications 202H User Manual

Page of 309
Prestige 202H User’s Guide 
26-22 
VPN/IPSec Setup 
Table 26-10 Menu 27.1.1.2 Manual Setup 
FIELD DESCRIPTION 
EXAMPLE 
Key  Enter the authentication key to be used by IPSec if applicable. The key 
must be unique. Enter 16 characters for MD5 authentication and 20 
characters for SHA-1 authentication. Any character may be used, 
including spaces, but trailing spaces are truncated. 
123456789abcde
AH Setup 
The AH Setup fields are N/A if you chose an ESP Active Protocol
 
SPI (Decimal)  The SPI must be from one to four unique decimal characters ("0" to "9") 
long. 
N/A 
Authentication 
Algorithm 
Press [SPACE BAR] to choose from MD5 or SHA1 and then press 
[ENTER]. 
N/A 
Key  Enter the authentication key to be used by IPSec if applicable. The key 
must be unique. Enter 16 characters for MD5 authentication and 20 
characters for SHA-1 authentication. Any character may be used, 
including spaces, but trailing spaces are truncated. 
N/A 
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to save 
your configuration, or press [ESC] at any time to cancel. 
26.13  Telecommuter VPN/IPSec Examples 
The following examples show how multiple telecommuters can make VPN connections to a single Prestige at 
headquarters from remote IPSec routers that use dynamic WAN IP addresses. 
26.13.1 
Telecommuters Sharing One VPN Rule Example 
Multiple telecommuters can use one VPN rule to simultaneously access a Prestige at headquarters. They 
must all use the same IPSec parameters (including the pre-shared key) but the local IP addresses (or ranges of 
addresses) cannot overlap. See the following table and figure for an example. 
 Having everyone use the same pre-shared key may create a vulnerability. If the pre-shared key is 
compromised, all of the VPN connections using that VPN rule are at risk. A recommended alternative is to 
use a different VPN rule for each telecommuter and identify them by unique IDs (see section 26.13.2 for an 
example).