What you will need
IP Address Table (example):
Item | Description | Assigned By |
| |
|
|
|
|
|
External IP | The IP address that identifies the SOHO to the Internet. | ISP |
| |
Address |
|
|
|
|
| Site A: | 207.168.55.2 |
|
|
| Site B: | 68.130.44.15 |
|
|
External | The overlay of bits that determines which part of the IP | ISP |
| |
Subnet Mask | address identifies your network. For example, a Class C |
|
| |
| address licenses 256 addresses and has a netmask of |
|
| |
| 255.255.255.0. |
|
| |
| Site A: | 255.255.255.0 |
|
|
| Site B: 255.255.255.0 |
|
| |
Local Network | A private network address used by an organization’s local | You |
| |
Address | network for identifying itself within the network. A local |
|
| |
| network address cannot be used as a external IP address. |
|
| |
| WatchGuard recommends using an address from one of the |
|
| |
| reserved ranges: |
|
| |
| 10.0.0.0 — 255.0.0.0 |
|
| |
| 172.16.0.0 — 255.240.0.0 |
|
| |
| 192.168.0.0/16 — 255.255.0.0 |
|
| |
| Site A: | 255.255.255.0 |
|
|
| Site B: 255.255.255.0 |
|
| |
Shared Secret | A phrase stored at both ends of the tunnel to authenticate | You |
| |
| the transmission as being from the claimed origin. The |
|
| |
| secret can be any phrase, but mixing numerical, special, |
|
| |
| alphabetical, and uppercase characters improves security. |
|
| |
| For example, “Gu4c4mo!3” is better than “guacamole” |
|
| |
| Site A: | OurLittleSecret |
|
|
| Site B: OurLittleSecret |
|
| |
Encryption | Encryption method determines the length in bits of the key | You |
| |
Method | used to encrypt and decrypt communication packets. DES is |
|
| |
| a |
|
| |
| more secure. It is also slower. Either 3DES or DES may be |
|
| |
| selected as long as both sides use the same method. |
|
| |
| Site A: | 3DES |
|
|
| Site B: 3DES |
|
| |
Authentication | Both sides must use the same method. | You |
| |
| Site A: | MD5 |
|
|
| Site B: MD5 |
|
|
User Guide 5.0 | 99 |