Proroute
GEM
2M
4G
Router
GEM-2M series User Manual
96
3.
Peer IP/Domain:
The IP address or Domain name of remote PPTP server.
4.
User Name:
The user name which can be validated by remote PPTP server.
5.
Password:
The password which can be validated by remote PPTP server.
6.
Default Gateway/Peer Subnet:
You can choose “Default Gateway” option or
“Peer Subnet” option here. When “Default Gateway” is chosen, all traffic from
Intranet of Business Security Gateway goes over this PPTP tunnel if these
packets don’t match the Peer Subnet of other PPTP tunnels. There is only one
PPTP tunnel to own the “Default Gateway” property. However, when “Peer
Subnet” is chosen, peer subnet parameter needs to be filled and it should be the
LAN subnet of remote PPTP server. If an Intranet packet wants to go to this peer
subnet, the PPTP tunnel will be established automatically.
7.
Connection Control:
There are three connection control options for users to
choose when the PPTP tunnel is established. You can choose
“Connect-on-Demand”, “Auto Reconnect (always-on)”, or “Manually”. By default,
it is “Auto Reconnect (always-on)”.
8.
Authentication Protocol:
You can choose authentication protocol as PAP,
CHAP, MS-CHAP, or MS-CHAP v2. The protocol you choose must be supported
by remote PPTP server.
9.
MPPE Encryption:
Check the “Enable” box to activate MPPE encryption.
Please note that MPPE needs to work with MS-CHAP or MS-CHAP v2
authentication methods.
10.
NAT before Tunneling
: Check the “Enable” box to let hosts in the Intranet of
Business Security Gateway
can go to access Internet via remote PPTP server.
By default, it is enabled. However, if you want the remote PPTP
Server to
monitor the Intranet of local Business Security Gateway, the option can’t be
enabled.
11.
LCP Echo Type:
Choose the way to do connection keep alive. By default, it is
“Auto” option that means system will automatically decide the time interval
between two LCP echo requests and the times that system can retry once
system LCP echo fails. You also can choose “User-defined” option to define the
time interval and the retry times by yourself. The last option is “Disable”.
12.
Tunnel
: Check the “Enable” box to activate the tunnel.
3.2.3.4 L2TP
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol
used to support virtual private networks (VPNs) or as part of the delivery of services
by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies
on an encryption protocol that it passes within the tunnel to provide privacy.