4. CONFIGURATION
Continued from previous page
Item
Description
Remote Subnet Mask
Subnet mask of a network behind remote side of the tunnel.
Remote Protocol/Port
Specifies Protocol/Port of remote side of the tunnel. The general
form is
protocol
/
port
, for example 17/1701 for UDP (protocol 17)
and port 1701. It is also possible to enter only the number of
protocol, however, the above mentioned format is preferred.
Local ID
Identifier (ID) of local side of the tunnel. It consists of two parts:
a
hostname
and a
domain-name
.
Local Subnet
IP address of a local network.
Local Subnet Mask
Subnet mask of a local network.
Local Protocol/Port
Specifies Protocol/Port of a local network. The general form is
protocol
/
port
, for example 17/1701 for UDP (protocol 17) and
port 1701. It is also possible to enter only the number of protocol,
however, the above mentioned format is preferred.
Encapsulation Mode
Specifies the IPsec mode, according to the method of encap-
sulation. You can select the
tunnel
mode in which the entire IP
datagram is encapsulated or the
transport
mode in which only IP
header is encapsulated.
NAT traversal
Enable/disables NAT address translation on the tunnel. If you
use NAT between the end points of the tunnel, then enable this
parameter.
IKE Mode
Specifies the mode for establishing a connection (
main
or
ag-
gressive
). If you select the aggressive mode, then the router es-
tablishes the IPsec tunnel faster, but the encryption is perma-
nently set to 3DES-MD5.
We recommend that you not use the
aggressive
mode due to lower security!
IKE Algorithm
Specifies the means by which the router selects the algorithm:
•
auto
– The encryption and hash algorithm are selected au-
tomatically.
•
manual
– The encryption and hash algorithm are defined
by the user.
IKE Encryption
Encryption algorithm – 3DES, AES128, AES192, AES256.
IKE Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
Continued on next page
62
Summary of Contents for SPECTRE V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 22: ...3 STATUS Figure 4 WiFi Scan 13 ...
Page 32: ...4 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 23 ...
Page 37: ...4 CONFIGURATION Figure 19 Example of VRRP configuration backup router 28 ...
Page 44: ...4 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Page 51: ...4 CONFIGURATION Figure 25 WiFi Configuration 42 ...
Page 74: ...4 CONFIGURATION Figure 39 IPsec Tunnels Configuration 65 ...
Page 105: ...4 CONFIGURATION Figure 63 Example 2 USB port configuration 96 ...