Networks
Authentication
To access your VPN, clients will need to authenticate by your choice of methods.
Choose between the
Preshared Key
and
X.509 Certificate
methods of
authentication.
Mode
Choose
Main Mode
if both IPsec peers use static IP addresses. Choose
Aggressive Mode
if one of the IPsec peers uses dynamic IP addresses.
Force UDP
Encapsulation
For forced UDP encapsulation regardless of NAT-traversal, tick this checkbox.
Pre-shared Key
This defines the peer authentication pre-shared key used to authenticate this
VPN connection. The connection will be up only if the pre-shared keys on each
side match.
Remote
Certificate (pem
encoded)
Available only when
X.509 Certificat
e is chosen as the
Authentication
method,
this field allows you to paste a valid X.509 certificate.
Local ID
In
Main Mode
, this field can be left blank. In
Aggressive Mode
, if
Remote
Gateway IP Address
is filled on this end and the peer end, this field can be left
blank. Otherwise, this field is typically a U-FQDN.
Remote ID
In
Main Mode
, this field can be left blank. In
Aggressive Mode
, if
Remote
Gateway IP Address
is filled on this end and the peer end, this field can be left
blank. Otherwise, this field is typically a U-FQDN.
Phase 1 (IKE)
Proposal
In
Main Mode
, this allows setting up to six encryption standards, in descending
order of priority, to be used in initial connection key negotiations. In
Aggressive
Mode
, only one selection is permitted.
Phase 1 DH
Group
This is the Diffie-Hellman group used within IKE. This allows two parties to
establish a shared secret over an insecure communications channel. The larger
the group number, the higher the security.
Group 2
:
1024-bit
is the default value.
Group 5
:
1536-bit
is the alternative option.
Phase 1 SA
Lifetime
This setting specifies the lifetime limit of this Phase 1 Security Association. By
default, it is set at
3600
seconds.
Phase 2 (ESP)
Proposal
In
Main Mode
, this allows setting up to six encryption standards, in descending
order of priority, to be used for the IP data that is being transferred. In
Aggressive Mode
, only one selection is permitted.
Phase 2 PFS
Group
Perfect forward secrecy (PFS) ensures that if a key was compromised, the
attacker will be able to access only the data protected by that key.
None
- Do not request for PFS when initiating connection. However, since there
is no valid reason to refuse PFS, the system will allow the connection to use
PFS if requested by the remote peer. This is the default value.
176
Copyright @ 2021 Peplink
Summary of Contents for PEPWAVE BR1 Classic
Page 21: ...https www peplink com 21 Copyright 2021 Peplink...
Page 53: ...2 26 MAX BR1 M2M 2 26 1 Panel Appearance https www peplink com 53 Copyright 2021 Peplink...
Page 82: ...STEP 3 Assemble SMA connectors to the bracket https www peplink com 82 Copyright 2021 Peplink...
Page 85: ...0 https www peplink com 85 Copyright 2021 Peplink...
Page 96: ...https www peplink com 96 Copyright 2021 Peplink...
Page 258: ...https www peplink com 258 Copyright 2021 Peplink...
Page 271: ...https www peplink com 271 Copyright 2021 Peplink...
Page 317: ...https www peplink com 317 Copyright 2021 Peplink...
Page 320: ...https www peplink com 320 Copyright 2021 Peplink...
Page 327: ...CE Statement for Pepwave Routers MAX BR1 MK2 https www peplink com 327 Copyright 2021 Peplink...
Page 328: ...https www peplink com 328 Copyright 2021 Peplink...
Page 333: ...https www peplink com 333 Copyright 2021 Peplink...
Page 336: ...https www peplink com 336 Copyright 2021 Peplink...
Page 342: ...https www peplink com 342 Copyright 2021 Peplink...
Page 345: ...https www peplink com 345 Copyright 2021 Peplink...
Page 348: ...https www peplink com 348 Copyright 2021 Peplink...
Page 352: ...https www peplink com 352 Copyright 2021 Peplink...
Page 354: ...https www peplink com 354 Copyright 2021 Peplink...
Page 357: ...https www peplink com 357 Copyright 2021 Peplink...
Page 364: ...https www peplink com 364 Copyright 2021 Peplink...
Page 371: ...CE Statement for Pepwave Routers MAX HD2 IP67 https www peplink com 371 Copyright 2021 Peplink...
Page 372: ...https www peplink com 372 Copyright 2021 Peplink...
Page 374: ...CE Statement for Pepwave Routers MAX HD1 Dome https www peplink com 374 Copyright 2021 Peplink...
Page 375: ...https www peplink com 375 Copyright 2021 Peplink...
Page 377: ...CE Statement for Pepwave Routers MAX HD2 Dome https www peplink com 377 Copyright 2021 Peplink...
Page 378: ...https www peplink com 378 Copyright 2021 Peplink...
Page 380: ...CE Statement for Pepwave Routers MAX BR1 ESN https www peplink com 380 Copyright 2021 Peplink...
Page 381: ...https www peplink com 381 Copyright 2021 Peplink...
Page 385: ...CE Statement for Pepwave Routers MAX HD4 https www peplink com 385 Copyright 2021 Peplink...
Page 386: ...https www peplink com 386 Copyright 2021 Peplink...
Page 388: ...CE Statement for Pepwave Routers MAX HD4 IP67 https www peplink com 388 Copyright 2021 Peplink...
Page 389: ...https www peplink com 389 Copyright 2021 Peplink...
Page 392: ...https www peplink com 392 Copyright 2021 Peplink...
Page 397: ...https www peplink com 397 Copyright 2021 Peplink...
Page 399: ...CE Statement for Pepwave Routers MAX Transit For LM960A18...
Page 400: ......
Page 404: ...CE Statement for Pepwave Routers MAX Transit Mini...
Page 405: ......
Page 410: ...CE Statement for Pepwave Routers MAX BR1 PRO MAX BR2 PRO UBR LTE...
Page 411: ......
Page 414: ...CE Statement for Pepwave Routers MAX BR1 IP55...
Page 415: ......
Page 417: ...CE Statement for Pepwave Routers MAX BR2 IP55...
Page 418: ......