background image

Chapter3

Advanced Configuration

20

Wreless-N ADSL2+ Gateway

Authentcaton 

Authentication  acts  as  another  level  of 

security.  There are two types of authentication: MD5 and 

SHA (SHA is recommended because it is more secure).  As 

with encryption, either of these may be selected, provided 

that the VPN device at the other end of the tunnel is using 

the  same  type  of  authentication.    Or,  both  ends  of  the 

tunnel may choose to Disable authentication.  

Key Management

In order for any encryption to occur, the two ends of the 

tunnel must agree on the type of encryption and the way 

the data will be decrypted.  This is done by sharing a “key” 

to the encryption code.  Under Key Management, you may 

choose automatic or manual key management.

Auto (IKE) Key Management 

Encrypton 

The  Encryption  method  determines  the 

length  of  the  key  used  to  encrypt/decrypt  ESP  packets. 

Notice that both sides must use the same method. 

Authentcaton 

The  Authentication  method  authen-

ticates the Encapsulating Security Payload (ESP) packets. 

Select MD5 or SHA. Notice that both sides (VPN endpoints) 

must use the same method. 

MD5 - A one-way hashing algorithm that 

produces a 128-bit digest 
SHA - A one-way hashing algorithm that produces 

a 160-bit digest 

Perfect  Forward  Secrecy  (PFS) 

If  PFS  is  enabled,  IKE 

Phase  2  negotiation  will  generate  new  key  material  for 

IP  traffic  encryption  and  authentication.  Note  that  both 

sides must have PFS enabled. 

Pre-Shared  Key 

IKE  uses  the  Pre-Shared  Key  to 

authenticate  the  remote  IKE  peer.  Both  character  and 

hexadecimal values are acceptable in this field, e.g., “My_

@123” or “0x4d795f40313233”. Note that both sides must 

use the same Pre-Shared Key. 

Key  Lfetme 

This  field  specifies  the  lifetime  of  the 

IKE generated key. If the time expires, a new key will be 

renegotiated  automatically. The  Key  Lifetime  may  range 

from 300 to 100,000,000 seconds. The default lifetime is 

3600 seconds. 

Manual Key Management 

Encrypton  Algorthm 

The 

Encryption 

method 

determines the length of the key used to encrypt/decrypt 

ESP  packets.  Notice  that  both  sides  must  use  the  same 

method. 

Encrypton Key  

This field specifies a key used to encrypt 

and  decrypt  IP  traffic.  Both  character  and  hexadecimal 

values  are  acceptable  in  this  field.  Note  that  both  sides 

must use the same Encryption Key. 

Authentcaton Algorthm 

The Authentication method 

authenticates  the  Encapsulating  Security  Payload  (ESP) 

packets. Select MD5 or SHA. Notice that both sides (VPN 

endpoints) must use the same method. 

MD 

A one-way hashing algorithm that produces a 128-

bit digest 

SHA 

A one-way hashing algorithm that produces a 160-

bit digest 

Authentcaton  Key 

This  field  specifies  a  key  used  to 

authenticate  IP  traffic.  Both  character  and  hexadecimal 

values  are  acceptable  in  this  field.  Note  that  both  sides 

must use the same Authentication Key. 

Inbound  SPI/Outbound  SPI 

The  Security  Parameter 

Index (SPI) is carried in the ESP header. This enables the 

receiver  to  select  the  SA,  under  which  a  packet  should 

be processed. The SPI is a 32-bit value. Both decimal and 

hexadecimal  values  are  acceptable.  e.g., “987654321”  or 

“0x3ade68b1”. Each tunnel must have a unique Inbound 

SPI  and  Outbound  SPI.  No  two  tunnels  share  the  same 

SPI.  Note  that  the  Inbound  SPI  must  match  the  remote 

gateway’s Outbound SPI, and vice versa.
The  Status  field  at  the  bottom  of  the  screen  will  show 

when a tunnel is active.
To connect a VPN tunnel, click the 

Connect

 button. Click 

the 

Dsconnect

  button  to  break  a  connection  for  the 

current VPN tunnel. The 

Vew Log

 button, when logging is 

enabled on the Log screen of the Administration tab, will 

show you VPN activity on a separate screen. The VPN Log 

screen displays successful connections, transmissions and 

receptions,  and  the  types  of  encryption  used.  For  more 

advanced  VPN  options,  click  the 

Advanced  Settngs

 

button to open the Advanced Settings screen.
Click 

Save Settngs

 to apply your changes, or click 

Cancel 

Changes

 to cancel your changes.

Advanced VPN Tunnel Setup

Advanced VPN Tunnel Setup

Содержание WAG325N

Страница 1: ...USER GUIDE Wireless N ADSL2 Gateway Model No WAG325N...

Страница 2: ...address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may...

Страница 3: ...wall 18 Security VPN Passthrough 18 Security VPN 19 Access Restrictions Internet Access Policy 21 Applications and Gaming Single Port Forwarding 22 Applications and Gaming Port Range Forwarding 23 App...

Страница 4: ...35 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 36 CE Marking 37 National Restrictions 37 Product Usage Restrictions 38 Technical Documents on www linksys com intern...

Страница 5: ...port It flashes to indicate network activity over that port DSL Green The DSL LED lights up whenever there is a successful DSL connection The LED flashes while the Gateway is establishing the ADSL co...

Страница 6: ...MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Страница 7: ...the Ethernet ports on the back of the Gateway Connect the Computer 1 2 3 4 Repeat steps 1 4 for every computer or device that you want to connect to the Gateway via Ethernet If you connect more than...

Страница 8: ...4 PPPoA How to Access theWeb Based Utility To access the web based utility launch the web browser on your computer and enter the Gateway s default IP address 192 168 1 1 in the Address field Then pres...

Страница 9: ...f they use PPPoA If they do you will have to enable PPPoA Internet Connection Type RFC 2364 PPPoA PPPoA Settings User Name and Password Enter the User Name and Password provided by your ISP Connect on...

Страница 10: ...how often you want the Gateway to check the Internet connection The default Redial Period is 30 seconds RFC 1483 Routed If you are required to use RFC 1483 Routed then select RFC 1483 Routed Internet...

Страница 11: ...equire these names as identification You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name In most cases leaving these fields bl...

Страница 12: ...et translates domain or website names into Internet addresses or URLs At least one DNS server IP address is provided by your ISP You can enter up to three DNS server IP addresses here The Gateway will...

Страница 13: ...2 digit code assigned to a unique piece of hardware for identification Some ISPs will require you to register a MAC address in order to access the Internet If you do not wish to re register the MAC ad...

Страница 14: ...he IP address is set to 0 Subnet Mask The Subnet Mask determines which portion of a Destination IP Address is the network portion and which portion is the host portion Gateway This is the IP address o...

Страница 15: ...erprise RADIUS and WEP WPA Wi Fi Protected Access is a security standard stronger than WEP Wired Equivalent Privacy encryption WPA2isamoreadvanced moresecureversion ofWPA WPA Enterprise WPA2 Enterpris...

Страница 16: ...nce WPA2 recom mended This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the device Security Mode RADIUS RADIUS Server Ent...

Страница 17: ...cel your changes Wireless Wireless Mac Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter...

Страница 18: ...have the device automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the device and a wireless...

Страница 19: ...e Java filtering Deselect the feature to allow Java usage Filter Cookies A cookie is data stored on your computer and used by Internet sites when you interact with them Select Filter Cookies to filter...

Страница 20: ...the Internet side Remote Security Gateway The Remote Security Gateway is the VPN device such as a second VPN Router on the remote end of the VPN tunnel Under Remote Security Gateway you have three opt...

Страница 21: ...anual Key Management Encryption Algorithm The Encryption method determines the length of the key used to encrypt decrypt ESP packets Notice that both sides must use the same method Encryption Key This...

Страница 22: ...period of your choosing Enter the number of seconds you d like the key to be used until a re key negotiation between each endpoint is completed Phase 2 Group There are two Diffie Hellman Groups to ch...

Страница 23: ...ing by URL Address field You can also block websites using specific keywords Enter each keyword in a separate Website Blocking by Keyword field 1 2 3 4 5 6 7 8 You can filter access to various service...

Страница 24: ...Check with the Internet application documentation for more information Protocol Select the protocol used for this application either TCP or UDP or Both IP Address For each application enter the IP add...

Страница 25: ...upport The No Acknowledgement feature is available only when the WMM Support feature is enabled WMM Support Wi Fi Multimedia is a QoS feature defined by WiFi Alliance before IEEE 802 11e was finalized...

Страница 26: ...s can range from 1 to 65535 Check your application s documentation for details on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Med...

Страница 27: ...re admin Gateway Userlist Select the number of the user The default is user 1 Gateway User Name Enter the default Gateway User Name admin Gateway Password Linksys recommends that you change the defaul...

Страница 28: ...your changes Administration Log The Gateway can keep logs of traffic and events for your Internet connection Administration Log Log Log TodisabletheLogfunction keepthedefault Disable To monitor traff...

Страница 29: ...Changes to cancel your changes Administration Backup Restore TheBackup Restore screenallowsyoutobackuporrestore the Gateway s settings using a configuration file Administration Backup Restore Backup C...

Страница 30: ...a different language select one from the drop down menu The language of the web based utility will change five seconds after you select another language Status Gateway The Gateway screen displays info...

Страница 31: ...n to view the current IP and MAC addresses for the local network clients of the Gateway ARP RARP Table ARP RARPTable An ARP request is a request sent by the Gateway asking local network devices with I...

Страница 32: ...ffice PVC Connection Encapsulation The Encapsulation setting selected on the Basic Setup screen is displayed Multiplexing The Multiplexing setting selected on the Basic Setup screen is displayed Qos T...

Страница 33: ...steps are specific to Internet Explorer but are similar for other browsers Select Tools Internet Options Click the Connections tab Select Never dial a connection Click OK You are using a static IP add...

Страница 34: ...ures Password Protected Configuration for Web Access PAP and CHAP Authentication Denial of Service DoS Prevention URL Filtering and Keyword Java ActiveX Proxy Cookie Blocking ToD Filter Blocks Access...

Страница 35: ...CLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also ha...

Страница 36: ...device complies with Industry Canada ICES 003 and RSS210 rules Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Страница 37: ...voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra rilevanti...

Страница 38: ...utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito DasProduktkanninallenEUStaateno...

Страница 39: ...put power are specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm 1 2...

Страница 40: ...ecyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se likv...

Страница 41: ...ter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination et l...

Страница 42: ...lsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands Dut...

Страница 43: ...n m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce sa likvid ci...

Отзывы: