D-Link DRO-210i manual Virtual Private Network

Page 49

Virtual Private Network

Virtual Private Network

VPN or virtual private networks allow multiple sites from an organization (and its clients, suppliers, etc.) to communicate securely over an insecure internet by encrypting all communication between the sites.

IPSec protocol is the Internet standard protocol for tunneling, encryption and authentication. IPSec can be used to protect the path between a pair of security gateways (Peer-To-Peer Mode) or between a security gateway and a host (IPSec Server Mode).

IPSec is designed to protect the network traffic by addressing basic issues like:

￿Access control: This is controlling the access to the remote host machines from the local hosts. This also involves local host access control, where the system administrators can control which local hosts can communicate to the remote hosts through the local IPSec gateways.

￿Data integrity: This makes sure that the data that is transferred from one IPSec gateway to another IPSec gateway is not tampered (changed).

￿Authentication of IPSec peers: This ensures that an IPSec peer is communicating with the proper remote IPSec peer. So it involves authenticating the remote IPSec peer.

￿Protection against replays: An intermediate person between any two communicating IPSec peers can spoof the packet, tamper it and then repeatedly send it to any of those IPSec gateways, thus causing Denial – of – Service attack. So IPSec has the capability to prevent this attack.

￿Traffic Confidentiality: This involves encrypting the data so that a third person cannot peek in through the data.

IPSec provides the securing services at IP layer, offering protection for IP and upper layer protocols. The security services are provided through the use of the following protocols

￿Cryptographic key management procedures and protocols, including the Internet Security Association and Key Management Protocol (ISAKMP) and the Internet Key Exchange protocol (IKE). In order to use IPSec, both the communicating peers need to have the same protocol, encryption algorithms and keys. IKE provides the mechanism for a pair of IPSec entities to negotiate security services and their associated session authentication and encryption keys.

￿Security protocols such as the Authentication Header (AH) and the Encapsulating Security Payload (ESP). The Authentication Header (AH) addresses data origin authentication, data integrity, and replay protection. The Encapsulating Security Payload (ESP) header has the same capabilities as AH in addition to data confidentiality and encryption. IPSec uses the AH by default. If data confidentiality is desired, ESP can be used, which has the additional encryption feature.

Dlink DRO-210i User Guide

49

Image 49
Contents DRO-210i Table Of Contents Virtual Private Network Bold About This ManualProduct Overview Product OverviewDlink DRO-210i User Guide Hardware Details DRO-210i Package ContentsFront Panel Rear Panel Routing Software FeaturesVPN Tools Optional Port Configuration Port ConfigurationDisabled WAN2/DMZ InterfacesLAN Interface LAN SettingsDMZ Interface Forgot LAN IP ?WAN Interface DMZ SettingsMaximum Transmission Unit Dynamic Mode Static ModeIP Settings for WAN1 Interface Dhcp Settings for WAN1 InterfaceUnnumbered Interfaces PPPoE ModePPPoE Settings for WAN1 Interface Dhcp DHCP, DNS and TimeDhcp Server DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy DNS Proxy SettingsTime System Time SettingsRouting RoutingDynamic Routing Static RoutingStatic Routing RIP Settings Policy Based Routing Routing TableRouting Table Policy Based RoutingTo the same destination Backup Configuration Auto BackupHigh Availability High AvailabilityLoad Balancing Load Balancing ConfigurationEthernet Link Detection Ethernet WAN Link Detection NAT Interface Configuration NAT Interface ConfigurationNetwork Address Translation NATNAT Configuration NAT ConfigurationNAT Exception NAT Exception Virtual ServerVirtual Server/NAPT SIP-ALG SIP ALG ConfigurationNAT Session Table NAT TableFirewall Interface Configuration Interface ConfigurationFirewall Firewall PoliciesPolicy Rules Policy RulesInbound Policies Permitted Services Permitted ServicesInbound Policies Inbound PoliciesIP Permitted Rules Outbound PoliciesAdd Permitted IP Rule Outbound Policies Outbound PoliciesOutbound Policies Service Blocked Rule Blocked ServicesIP Blocked Rules Add Blocked IP RuleUntrusted Domain Domain FilterOutbound Policies Untrusted Domain Trusted DomainJava Filter Web FilterCookie Filter ActiveX FilterKeyword Exception Keyword FilterFile Extension Filter Blocking Log MAC FilterAdd Blocked MAC Address Blocking Log TableIntrusion Detection IDS ConfigurationIDS Configuration Black List Intrusion LogIntrusion Log Table Black List TableVirtual Private Network Virtual Private NetworkPeer-To-Peer IPSec Tunnel or PassthroughIPSec Passthrough IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server IPSec Server ConfigurationsMaximum life duration is 86400 seconds Tunnel Table Tunnel Remote ID ConfigurationLimitation IPSec Status IPSec StatusIPSec Log Table IPSec LogClass Configuration Quality of ServiceQuality of Service HTB QoS ConfigurationsQuality of Service QoS Filter Configurations Filter ConfigurationTOS/DiffServ Type Of Service/DiffServQuality of Service Administration AdministrationDevice Information Device InfoSession Log Traffic StatisticsTraffic Statistics SysLog Password ChangeSession Log System LogPassword Recovery Change PasswordSystem SystemUpload/Download Update Firmware/ConfigurationRemote Access Remote AccessPing Test Ping TestAdministration Dlink DRO-210i User Guide Frequently Asked Questions Frequently Asked QuestionsGeneral DHCP, DNS Q6. What is the purpose of Dhcp Server Auto Configuration?High Availability RoutingFirewall Frequently Asked Questions 11.6 NAT 11.7 VPN Q21. What are the call features supported by SIP-ALG?11.8 QoS Frequently Asked Questions

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.