CRADLEPOINT
COR | USER MANUAL Firmware ver. 5.0.0
© 2013
CRADLEPOINT, INC. PLEASE VISIT
HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/
FOR MORE HELP AND RESOURCES
PAGE 162
7.6.2
Authentication
•
Remote Name
– Authorization name specified by and to the remote system
as its identity, sometimes a username or hostname. Leave blank to match
any.
•
Local Name
– Authorization name specified by and to the remote system as
the local system identity; sometimes a username or hostname. Leave blank
to match any.
•
Secret
– Shared secret (or password) used to authenticate the associated
Local and Remote names.
Overrides
– Override Authentication methods/parameters. With methods set to
Allow the two ends of the tunnel can negotiate a common scheme. Some times this
negotiation fails, or the implementation on one end is incompatible with the other.
To solve those authentication issues, enable the overrides as needed.
•
Authentication
– Username for user-specific authorization. Leave blank to
disable.
•
CHAP
– Choose from Allowed, Refused, or Required.
•
PAP
– Choose from Allowed, Refused, or Required.
•
Name
– Override names used to authenticate the router. Leave empty to use the default.
7.6.3
Routes
Typically specific routes are unnecessary, but they can be added in this
section if needed. You can add or remove routes to be used to funnel
packets through the tunnel.
•
Network Address
– This is the network address that is the
destination of the route. This should be set to the network address at
the remote side of the tunnel.
•
Netmask
– This is the corresponding subnet mask of the network
being defined.
Summary of Contents for COR IBR600
Page 1: ......