Functions
MLR 3G 2.0
In order to
adjust the VPN ping interval
, use the entry field "Ping interval". En-
ter the interval in the amount of seconds, in which the VPN client of the MLR
3G 2.0 sends ping packets to the remote VPN terminal. The frequent ping is
used to keep the connection open via several routers and gateways, which
may participate in the connection and would close the channel in case there
was no communication.
In order to adjust the
ping restart interval
, use the entry field "Ping restart in-
terval". The ping restart interval configures the time in seconds after which
the tunnel is to be established again, if no ping from the remote terminal ar-
rived during the complete time. The value "0" prevents the tunnel to be ter-
minated, even if no ping is received any more.
In order to
send a ping via ICMP protocol
to a domain or an IP address addi-
tionally, enter this into the entry field "Additional ICMP Ping to". It is recom-
mended to enter a domain name or IP address, which can only be connected
via the tunnel, here. If the ping is not successful, a possibly existing tunnel will
be terminated, and a new tunnel will be established. The ping interval is 15
minutes.
In order to
configure the authentication with certificates
, select the radio but-
ton "Authentication based on certificate". It is indicated under the option here,
whether the individual certificates and keys are present (green checkmark) or
not (red cross). Present certificates can also be downloaded (blue arrow) or de-
leted again (red cross on white box). The private key can only be deleted. Al-
ternatively, or in addition to the usage of a client certificate and a private key,
an user name/password combination can be used for the authentication with
the OpenVPN server (however, the CA certificate is required in any case, which
must be possessed by every participant of this VPN). Enter a user name into
the field "User name" as well as the associated password into the field "Pass-
word" for this. In order to check the certificate type of the remote terminal,
check the checkbox "Check remote certificate type".
In order to
configure the authentication with static key
, select the radio but-
ton "No authentication or authentication with preshared key". It is indicated
under the option here, whether the static key is present (green checkmark) or
not (red cross). A present key can also be downloaded (blue arrow) or deleted
again (red cross on white box). If no key exists, the remote terminal will nei-
ther be authenticated nor the data traffic through the tunnel will be en-
crypted. You can also generate a new static key using the "Generate a new
static key" link. This static key must then be downloaded and also uploaded to
the remote terminal. Enter the IP address of the local tunnel end into the "IP
address of VPN tunnel local" field and the IP address of the remote tunnel end
into the "IP address of VPN tunnel remote" field. Enter the address as well as
the associated netmask of the network behind the VPN tunnel into the
"Netaddress of network behind the VPN tunnel" and "Netmask of network be-
hind the VPN tunnel" fields.
In order to
confirm all settings
made above, click on "OK".
In order to
upload a certificate or key
, click in the section "Upload key or cer-
tificates" on the "Browse..." button. Then, select in the "Upload file" window
the desired file on the respective data carrier and click on the "Open" button. If
the file is encrypted, you must also enter the password into the "Password
(only with encrypted file)" field. Click on "OK" then to upload the file.
54