Functions
MoRoS GPRS 2.1 PRO
In order to assign a descriptive name to the loaded tunnel, enter it into the
field "Tunnel name". This makes the assignment of messages in the log or
status view easier.
In order to specify the remote terminal, to which the tunnel is to be estab-
lished, enter the IP address or the domain name of the remote terminal
into the field "IP address or domain name of remote site". If no remote
terminal is specified, incoming connection requests from all remote termi-
nals are accepted, but no connection can be initiated.
In order to define a network behind the switch of the MoRoS GPRS 2.1
PRO to be tunnelled, enter this network with according netmask into the
field "Local subnet". This does not have to be the actual local subnet, but
can also be behind further gateways. In such a case it must be observed
that the required routing rules are entered correctly. If this field is not
completed, the local subnet is used automatically.
In order to define the local subnet behind the remote terminal, enter this
network with according netmask into the field "Remote subnet". Only
data, which is addressed to this network, is packed in ESP packets.
In order to specify the ID of the remote terminal, enter it into the field
"Remote ID". The respective IP address is used as ID by default. If the ac-
tual IP address differs from the received ID (e.g. due to NAT routers in be-
tween) or is unknown, the ID of the remote terminal can be specified ex-
plicitly (a self-defined string, which must contain an "@"). When using cer-
tificates, the DN (Distinguished Name) is used as ID by default. The do-
main name of the remote terminal can also be used as ID, because it is re-
solved by a DNS lookup.
In order to adjust the own ID, enter it into the field "Local ID". This is only
necessary, if the default ID can or shall not be used.
In order to specify the authentication mode, select it in the drop-down list
"Authentication mode". The main mode is more secure, because all au-
thentication data is transmitted encrypted. The aggressive mode is
quicker, because it does not use encryption and the authentication is pre-
formed via a passphrase.
In order to define encryption and hash algorithms as well as the Diffie-
Hellman group for the IKE key exchange, select these from the drop-down
lists "IKE algorithms".
In order to define encryption and hash algorithms for the IPsec connecti-
on, select these from the drop-down lists "IPsec algorithms".
In order to enter the maximum number of connection attempts, which
must be exceeded that a remote terminal is considered as not available,
enter this into the field "Maximum retries". A value of "0" means an infi-
nite number of attempts here.
80
Содержание MoRoS GPRS 2.1 PRO
Страница 1: ...Manual MoRoS GPRS 2 1 PRO...
Страница 2: ......
Страница 82: ...Functions MoRoS GPRS 2 1 PRO 82...
Страница 144: ......