ZyXEL 35 Guia Do Utilizador

Página de 335
 
 
ZyWALL 35 Support Notes 
 
 
All contents copyright (c) 2006 ZyXEL Communications Corporation.   
74
 
6)  Extended Authentication (xAuth) can be enabled or not depending on your application. For detailed 
info, you can refer to XXX. 
 
7)  Under “IKE Proposal”, select the Encryption and Authentication Algorithm. Note the configuration 
must be consist on both ZyWALLs (GW1 & GW2) 
 
8)  Click on “Apply” to save profile 
 
9)  The IKE rule will be configured as below: