TP-Link TL-ER604W manual 1 IKE, IKE Policy

Page 95

cause the private data to be exposed to all the users on the Internet. The VPN (Virtual Private Network) technology is developed and used to establish the private network through the public network, which can guarantee a secured data exchange.

VPN adopts the tunneling technology to establish a private connection between two endpoints. It is a connection secured by encrypting the data and using point-to-point authentication. The following diagram is a typical VPN topology.

Figure 3-61 VPN – Network Topology

As the packets are encapsulated and de-encapsulated in the Router, the tunneling topology implemented by encapsulating packets is transparent to users. The tunneling protocols supported by TL-ER604W contain Layer 3 IPsec and Layer 2 L2TP/PPTP.

3.6.1 IKE

In the IPsec VPN, to ensure a secure communication, the two peers should encapsulate and de-encapsulate the packets using the information both known. Therefore the two peers need to negotiate a security key for communication with IKE (Internet Key Exchange) protocols.

Actually IKE is a hybrid protocol based on three underlying security protocols, ISAKMP (Internet Security Association and Key Management Protocol), Oakley Key Determination Protocol, and SKEME Security Key Exchange Protocol. ISAKMP provides a framework for Key Exchange and SA (Security Association) negotiation. Oakley describes a series of key exchange modes. SKEME describes another key exchange mode different from those described by Oakley.

IKE consists of two phases. Phase 1 is used to negotiate the parameters, key exchange algorithm and encryption to establish an ISAKMP SA for securely exchanging more information in Phase 2. During phase 2, the IKE peers use the ISAKMP SA established in Phase 1 to negotiate the parameters for security protocols in IPsec and create IPsec SA to secure the transmission data.

3.6.1.1IKE Policy

On this page you can configure the related parameters for IKE negotiation.

Choose the menu VPN→IKE→IKE Policy to load the following page.

-90-

Image 95
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Glossary 151 Hardware Specifications 148Application 130 149Package Contents Overview of this Guide Symbol DescriptionIntended Readers ConventionsOverview of the Router Features Security WirelessTraffic Control Status Indication AppearanceFront Panel  LEDsRear Panel Status System ModeNetwork Page  Classic Mode WAN Mode NAT Mode  Non-NAT ModeStatic IP  WAN Mode3.2 WAN1 Tips Static IP WAN Static IP Following items are displayed on this screenHost Name Dynamic IP Dynamic IP Connection TypeServer Get IP Address byUnicast Use the following DNSWAN PPPoE PPPoEAccount Name PasswordActive Mode Settings Keep AliveSubnet Address Service NameISP Address Secondary ConnectionL2TP Gateway Address10 WAN L2TP Following items are displayed on this screen  L2TP SettingsConnection Default GatewaySecondary Pptp  L2TP StatusServer IP  Pptp SettingsInternet connection by the Connect or Disconnect BigPond  Pptp Status12 WAN Bigpond Following items are displayed on this screen  BigPond SettingsISP  BigPond StatusDhcp 4 LAN4.1 LAN  Dhcp Settings  Dhcp Reservation Dhcp ClientDhcp Reservation Set the MAC Address for WAN port MAC Address List of Reserved Address Set the MAC Address for LAN portPort SwitchStatistics  MAC Address Statistics Port MirrorMirrored Port Enable Port MirrorMode Mirroring Port Rate Control Rate ControlApplication Example  Port Config Port Config Port Vlan Port StatusPort Vlan  Wireless Setting WirelessWireless Setting Wireless Setting Wireless Parameter Security DescriptionSsid Broadcast AP IsolationWPA/WPA2 WEP Hexadecimal and Ascii formats are Multi-SSIDKey Format  General  Multi-SSID ConfigGuest Network Enable/DisableGroup Key EncryptionAuth Type  List of Group 1.3 WDSKey Type Scan Parameter BSSIDto be bridgedShort GI Wireless Advanced Wireless Advanced Key :MAC Filtering  Rule List Host Status Filtering Rules  Host Status User GroupGroup User  Group Config User Config View  View ConfigView  List of User1 NAT NAT SetupAdvanced  One-to-One NAT One-to-One NAT Multi-Nets NAT Multi-Nets NAT List of Rules Application Example Network Requirements Configuration procedureVirtual Server Protocol  Virtual ServerInterface  Port Triggering Port Triggering38 ALG Following items are displayed on this screen 1.6 ALGIPsec ALG SetupTraffic Control 323 ALGUpstream ControlControl all the time LimitedBandwidth Control Limited Bandwidth Session LimitSession Limit  List of Session Limit Session ListPolicy Routing ConfigurationLoad Balance WAN 45 Link Backup Following items are displayed on this screen Link BackupFailover WAN ConfigProtocol Timing List of Protocol RoutingStatic Route  Protocol Static Route 47 Static Route Following items are displayed on this screen5.2 RIP  List of RIP 48 RIP Following items are displayed on this screenRoute Table IP-MAC Binding FirewallAnti ARP Spoofing  IP-MAC Binding ARP ScanningARP List Attack Defense Defense Enable AttackFlood Defense Packet Anomaly MAC Filtering Access ControlMAC Filtering URL FilteringObject  URL Filtering RuleWeb Filtering Access RulesSource  Access RulesService PolicyPriority ServiceGroup on 3.3.1 Group DestinationDest. Port  Service List of Service NameApplication App ControlControl Rules  Control RulesDatabase VPNIKE Policy 1 IKE IKE Policy 62 IKE Policy Following items are displayed on this screenIKE Proposal  IKE Proposal 63 IKE Proposal Following items are displayed on this screen List of IKE Proposal IPsecIPsec Policy Local Subnet  IPsec PolicyPolicy Name IKE Policy Policy ModeRemote Subnet Remote GatewayESP Authentication Key-Out AH Authentication Key-InESP Authentication Key-In AH Authentication Key-Out IPsec Proposal IPsec Proposal List of IPsec Policy IPsec  List of IPsec Proposal IPsec SA Protocol Media Tunnel Length of Header Authentication3 L2TP/PPTP  L2TP/PPTP Tunnel 3.1 L2TP/PPTP TunnelPre-shard Key TunnelMax Connections L2TP/PPTP Server IP Address Pool  List of ConfigurationsIP Address Pool List of L2TP/PPTP TunnelGeneral ServicesPPPoE Server 70 General Following items are displayed on this screen IP Address Pool Static IP Address Account Account IP Address Assigned List of Account Is 48. If Enable Advanced Account Features is not selected,Exceptional IP  Exceptional IP BulletinList of Account Title Interval E-Bulletin  List of E-Bulletin Dynamic DNSPublisher  Dyndns Ddns DynDNS No-IP Ddns No-IP List of DynDNS Account  PeanutHull Ddns PeanutHull List of No-IP Account  List of PeanutHull Account Comexe List of Comexe Account UPnP Comexe Ddns  List of UPnP Mapping MaintenanceAdmin Setup Administrator Administrator Login Parameter Remote Management Remote Management List of Subnet Factory DefaultsManagement  Export Reboot Configuration Version Export and ImportLicense Firmware Upgrade123 StatisticsInterface Traffic Statistics  Interface Traffic Statistics Advanced WAN Information IP Traffic Statistics IP Traffic Statistics DiagnosticsDiagnostics  Traffic Statistics Tracert Online Detection Ping Port Displays the detected WAN port Detection TimePing DNS LookupLogs Send System Logs  Config List of Logs SeverityNetwork Requirements ApplicationSystem Mode Network Topology ConfigurationsInternet Setting Internet Connection System ModeIPsec VPN VPN SettingIKE Setting SettingsIKE1  IKE Policy IPsec Proposal IPsec SettingPFS DH1  IPsec Policy IP Address Pool Pptp VPN Setting L2TP/PPTP Tunnel  User Network ManagementUser Group  Group View App Control11 App Rules Enable Bandwidth ControlLAN WAN1 Bandwidth Control RuleScan and import the entries to ARP List Network SecurityLAN ARP Defense Set Attack Defense WAN ARP DefenseSet IP-MAC Binding Entry Manually 20 Attack Defense 145 Attack DefenseStatistics Traffic MonitoringPage Environmental and Physical Appendix a Hardware SpecificationsAppendix B FAQ Page Glossary Description Appendix C GlossaryAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb