98
Freecom Storage Gateway (FSG)
GB
5
5.7 Setting up Virtual Private Networks (VPNs)
A Virtual Private Network (VPN) is a computer network that uses a public network such
as the Internet to transfer private data. VPN users can exchange data just like in an
internal LAN. VPN are often used by companies as a way of providing access to the
company network to staff when they are out of the office. The process involves the FSG
establishing a VPN connection to the company's VPN gateway. Using this connection,
the employee is then able to perform his duties as if he/she were working directly in the
company's local area network.
Open Connections -> VPN -> ADD Connection in the main menu.
Status
You can enable or disable the VPN connection at any time here.
Name
Please enter any name of your choosing for the connection here.
Remote Host IP
In this field, please type in the IP address of the VPN routers that you wish to connect to
(you need to have an account on this router).
Remote Network
Enter the IP address and the network mask that you want to access. Example: 192.168.1.0/
24. The '0' at the end of the IP address signifies that you can reach any PC in the network
under the IP addresses 192.168.1.1 – 192.168.1.254. /24 indicates that this is a network
mask 255.255.255.0. If the network you are attempting to access contains several
subnets with the net mask 255.255.252.0, please enter /22 in place of /24.
ESP Encryption
This is where you set the encryption protocols. You can keep the default settings,
although they have to be supported by the remote machine.
ESP Encryption 3Des
Triple DES (3DES) is an advanced version of the Data Encryption Standard (DES). The old
DES only used key lengths of up to 56 bits. 3DES on the other hand uses three encryption
cycles and two or three keys. By using three keys, an actual key length of 112 bits is
provided.
MD5
MD5 sums are used by PGP and other programs to check the integrity of files. This
involves comparing the file's current MD5 sum with an accepted sum from earlier. This
allows the system to determine whether the file has been changed or is corrupt.