Twin WAN Series – User Guide | v1
Chapter 5 – VPN Configuration
This chapter applies to the VPN models of the Twin WAN Series only - the XC-DPG503
& XC-DPG603 Twin WAN Gateways.
Section 1: Overview
Virtual Private Network (VPN) uses encryption to connect computers over a public
network such as the Internet. Encrypted connections between computers are commonly
referred to as a tunnel. These secure tunnels permit sending private data from one
computer to another without the risk of unauthorized access from outside intruders.
Combined with low cost and straight forward configuration, the Twin WAN Gateway
makes VPN a perfect alternative to private communication lines.
XiNCOM's XC-DPG503 and XC-DPG603 are VPN capable Dual WAN Gateways with
industry standard IPsec encryption. It provides extremely secure LAN-to-LAN
connectivity over the Internet with the use of two concurrent VPN tunnels that will load
balance traffic requests while providing full redundancy with auto failover. These VPN
Gateway supports VPN by encryption, encapsulation, and authentication using the
following methods: DES/3DES/AES, MD5, SHA-1 and SHA-2; up to 30 IPsec tunnels
are permitted.
The
VPN Configuration
menu allows you to configure the behavior of the XiNCOM
VPN Gateway. Before creating a configuration, please review your requirement for VPN:
•
Is this going to be a Client – to – Gateway VPN or a Gateway – to – Gateway
VPN?
•
What type of authentication would you be using? (DES, 3DES or AES)
•
How many computers do you want to have access to the VPN?
Copyright © 2005 WINS International, LLC dba XiNCOM | All rights reserved.
56