EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Page 74

ZyXEL Communications ZYWALL 35
335 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZyWALL 35 Support Notes
All contents copyright (c) 2006 ZyXEL Communications Corporation.
74
6) Extended Authentication (xAuth) can be enabled or not depending on your application. For detailed
info, you can refer to XXX.
7) Under “IKE Proposal”, select the Encryption and Authentication Algorithm. Note the configuration
must be consist on both ZyWALLs (GW1 & GW2)
8) Click on “Apply” to save profile
9) The IKE rule will be configured as below:

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals