Efficient Networks 5800 manual Efficient Networks

Page 61

Efficient Networks® 5800 Series

Chapter 3: Additional Features

User Reference Guide

 

1.IPSec Policy Name: Enter a logical name for the IPSec policy. The name you choose is of no consequence to the other IPSec party.

2.Peer Binding: Specify the remote IKE peer to which this policy shall apply. This peer must be already defined with the IKE Peer Definition screen.

3.IPSec Proposal Bindings: Specify an IKE IPSec proposal to be used with this policy. The IKE IPSec proposal must be already defined with the IKE IPSec Proposal Definition screen.

4.PFS Group: Select the Perfect Forward Secrecy negotiation and Diffie-Hellman group to be used for each rekey. Perfect Forward Secrecy enhances the security of the key exchange. In the event of a key becoming compromised, only the data protected by that compromised key becomes vulnerable. You can choose None, Group 1 or Group 2.

5.IP Protocol: Specify a protocol to be used with this policy. You can also enable any protocol to be used by selecting “all”.

6.Source IP Address: Enter the IP address of the local area network that will use this policy. This will usually be the IP address assigned to the network local to your router.

7.Source Subnet Mask: Enter the subnet mask of the local area network that will use this policy. This will usually be the subnet mask assigned to the network local to your router.

8.Destination IP Address: Enter the IP address of the remote private network to which your router will connect using this policy.

9.Destination Subnet Mask: Enter the subnet mask of the remote private network to which your router will connect using this policy.

10.Source Port: Enter the port that will be the source of TCP/UDP traffic under this policy. You can specify All ports, a port number, or an IP application associated with a particular port. Because port numbers are TCP and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP (see Step 5: IP Protocol).

11.Destination Port: Enter the port that will be the destination of TCP/ UDP traffic under this policy. You can specify All ports, a port number, or an IP application associated with a particular port.

12.Click on Save IKE Settings to establish your IKE IPSec policy and return to the home screen.

Efficient Networks®

Page 3-29

Image 61
Contents Series Page Efficient Networks Limited Warranty General Provisions Page Installation TOC-2 Network Service Provider Requirements Installation RequirementsChapter IntroductionPackage Contents 5800 Series Router Fully Connected Connecting Your RouterMS Windows TCP/IP Properties Dialog Configuring Your ComputerAdministration Login Dialog Administration LoginRouter Information Screen Router Information Screen Easy SetupWide Area Network Configuration Easy SetupEfficient Networks Point-to-Point Protocol Screen Point-to-Point Protocol over ATMEfficient Networks Point-to-Point Protocol over Ethernet over PPPoA Screen Point-to-Point Protocol over Ethernet over PPPoAEfficient Networks Point-to-Point Protocol over Ethernet over RFC 1483 Screen Point-to-Point over Ethernet over RFCEfficient Networks RFC 1483 Networking Screen RFC 1483 NetworkingEfficient Networks RFC 1483 MER Networking Screen RFC 1483 MAC Encapsulated RoutingEfficient Networks Dynamic Host Configuration Protocol Screen Dynamic Host Configuration ProtocolEfficient Networks Local Area Network Configuration Efficient Networks Router Restart Screen Additional Features Access Control Screen Access ControlEfficient Networks Feature Activation Screen Feature ActivationEfficient Networks Current Date and Time Screen Setting The Date and TimeEfficient Networks Set Dhcp Screen Set DhcpEfficient Networks NAT Settings Screen NAT SettingsEfficient Networks Set Firewall Screen Set FirewallEfficient Networks Dial Backup Screen Dial BackupEfficient Networks IKE/IPSec Information Screen IKE/IPSec ConfigurationEfficient Networks Easy IKE/IPSec Setup Screen IKE/IPSec SetupEfficient Networks 10 Advanced IKE/IPSec Setup Screen Advanced IKE/IPSec SetupEfficient Networks 11 IKE Peer Definition Screen IKE Peer DefinitionEfficient Networks 12 IKE Proposal Definition Screen IKE Proposal DefinitionEfficient Networks 13 IKE IPSec Proposal Definition Screen IKE IPSec Proposal DefinitionEfficient Networks 14 IKE IPSec Policy Definition Screen IKE IPSec Policy DefinitionEfficient Networks 15 HyperTerminal Command Line Interface Screen Command Line InterfaceChapter Frequently Asked Questions Frequently Asked Questions Front Panel Product SpecificationsFront Panel Light Indications Color Hub Series Back Panel5C to 40C Hardware SpecificationsModem Specifications Failover to modem on console port Software SpecificationsAsynchronous Transfer Mode ATM Automatic IP and DNS assignment RFC PPP over Ethernet RFC Important Information about this device Safety and CertificationsRadio Frequency Interference Statement Modifications Canadian RF Interference StatementEuropean Community EC Declaration of Conformity Déclaration sur les parasites de haute fréquence Information importante concernant cet appareilAppendix a Déclaration canadienne RF sur L’Interférence Déclaration de conformité de la communauté européenne CE Declaración de la Comisión Federal de Comunicaciones FCC Información importante sobre el EquipoAppendix a Modificaciones Declaración Canadiense de Interferencias de RFDeclaración de Conformidad de la Comunidad Europea EC Konformität bezüglich Hochfrequenzstörungen Wichtige Information über das GerätAppendix a Konformität bezüglich Hochfrequenzstörungen für Kanada Europäische Kommunale EC Deklaration der Übereinstimmung Support Appendix B Operational Index Efficient Networks 5800 Series Sdsl

5800 specifications

The Efficient Networks 5800 is a prominent solution in the world of networking, specifically designed to cater to both residential and business connectivity needs. This versatile networking device combines performance, reliability, and advanced technology to deliver superior internet experiences.

One of the main features of the Efficient Networks 5800 is its robust VDSL2 capabilities. As an evolution of DSL technology, VDSL2 allows for higher data rates and improved performance over copper lines. This is particularly beneficial for areas where fiber optic connections are not readily available. The device supports multiple VDSL profiles, enabling it to adapt to various network conditions and requirements.

In addition to VDSL2, the Efficient Networks 5800 supports vectoring technology. This feature significantly reduces crosstalk interference among multiple VDSL lines, resulting in enhanced data transmission speeds and stability. This is crucial for customers who demand consistent high-speed internet for applications such as streaming, gaming, and video conferencing.

The Efficient Networks 5800 also exhibits advanced management features. With support for TR-069, service providers can remotely manage and configure the device, allowing for quicker troubleshooting and streamlined customer support. This reduces the need for on-site visits and enhances the overall customer experience.

Another characteristic worth noting is its dual-band Wi-Fi capabilities. The device operates on both the 2.4 GHz and 5 GHz frequency bands, allowing for optimal wireless connectivity. Users can enjoy reduced latency and improved speeds for devices connected to the 5 GHz band while simultaneously maintaining compatibility with legacy devices on the 2.4 GHz band.

Security features are also paramount in the Efficient Networks 5800. The device encompasses the latest encryption protocols to secure wireless connections and protect sensitive data from unauthorized access. With built-in firewalls and parental control settings, users can manage their network security effectively.

Additionally, the design of the Efficient Networks 5800 emphasizes heat dissipation and airflow, ensuring long-term reliability and performance. The compact and sleek form factor allows for easy placement in both home and office environments.

In summary, the Efficient Networks 5800 stands out as a powerful and flexible networking device boasting advanced VDSL2 and vectoring technologies, comprehensive management capabilities, dual-band Wi-Fi support, robust security features, and a user-friendly design. Its versatility makes it an ideal choice for both residential and business users looking for efficient and reliable connectivity solutions.