Proroute
GEM
2M
4G
Router
GEM-2M series User Manual
87
1.
Tunnel Name:
Enter the name of tunnel.
2.
Interface:
Decide the WAN Interface to establish the tunnel.
3.
Tunnel Scenario:
Support “Site to Site”, “Site to Host”, “Host to Site”, “Host to
Host” and “Dynamic VPN”. Select one from them.
4.
Operation Mode:
Default is “Always on” and other options depend on product
models.
5.
Encapsulation Protocol
: Default is ESP and other options depend on product
models.
6.
Keep-alive:
Check “Enable” box to keep alive the tunnel. By default, keep-alive
method is “Ping IP” and other options depend on product models. Input the IP
address
of remote host that exists in the opposite side of the VPN tunnel (Ex.
You can input the LAN IP address of remote Business Security Gateway). The
Interval is specified with the time interval between two ping requests, and by
default, it is 30 seconds. Now, the device will start to ping remote host when
there is no traffic within the VPN tunnel. If the device can't get ICMP response
from remote host anymore, it will terminate the VPN tunnel automatically.
3.2.3.2.5 Local & Remote Configuration
1.
Local Subnet:
The subnet of LAN site of local Business Security Gateway. It
can be a host, a partial subnet, or the whole subnet of LAN site of local gateway.