Vigor2850 Series User’s Guide
215
authentication of remote server.
IPSec Tunnel
- Build an IPSec VPN connection to the
server through Internet.
L2TP with IPSec Policy -
Build a L2TP VPN connection
through the Internet. You can select to use L2TP alone or
with IPSec. Select from below:
z
None:
Do not apply the IPSec policy. Accordingly,
the VPN connection employed the L2TP without
IPSec policy can be viewed as one pure L2TP
connection.
z
Nice to Have:
Apply the IPSec policy first, if it is
applicable during negotiation. Otherwise, the dial-out
VPN connection becomes one pure L2TP connection.
Must:
Specify the IPSec policy to be definitely applied on
the L2TP connection.
User Name -
This field is applicable when you select,
PPTP or L2TP with or without IPSec policy above.
Password -
This field is applicable when you select PPTP
or L2TP with or without IPSec policy above.
PPP Authentication -
This field is applicable when you
select, PPTP or L2TP with or without IPSec policy above.
PAP/CHAP is the most common selection due to wild
compatibility.
VJ compression -
This field is applicable when you select
PPTP or L2TP with or without IPSec policy above. VJ
Compression is used for TCP/IP protocol header
compression. Normally set to
Yes
to improve bandwidth
utilization.
IKE Authentication Method -
This group of fields is
applicable for IPSec Tunnels and L2TP with IPSec Policy.
z
Pre-Shared Key
- Input 1-63 characters as pre-shared
key.
z
Digital Signature (X.509)
- Select one predefined
Profiles set in the
VPN and Remote Access >>IPSec
Peer Identity
.
IPSec Security Method -
This group of fields is a must for
IPSec Tunnels and L2TP with IPSec Policy.
z
Medium AH (Authentication Header)
means data
will be authenticated, but not be encrypted. By default,
this option is active.
z
High (ESP-Encapsulating Security Payload)-
means
payload (data) will be encrypted and authenticated.
Select from below:
z
DES without Authentication
-Use DES encryption
algorithm and not apply any authentication scheme.
z
DES with Authentication-
Use DES encryption
algorithm and apply MD5 or SHA-1 authentication
algorithm.
z
3DES without Authentication
-Use triple DES
encryption algorithm and not apply any authentication
Summary of Contents for Vigor2850 Series
Page 1: ......
Page 2: ...Vigor2850 Series User s Guide ii...
Page 6: ...Vigor2850 Series User s Guide vi...
Page 26: ...Vigor2850 Series User s Guide 16 This page is left blank...
Page 252: ...Vigor2850 Series User s Guide 242...
Page 311: ...Vigor2850 Series User s Guide 301...
Page 318: ...Vigor2850 Series User s Guide 308 Below shows the successful activation of Web Content Filter...
Page 380: ...Vigor2850 Series User s Guide 370 This page is left blank...