D-Link DRO-210i manual Virtual Private Network

Page 51

Virtual Private Network

Add/Modify Tunnel

Tunnel ID

Enter the alphanumeric string that identifies the remote tunnel.

 

 

Tunnel Source

Select the WAN interface, which serves as the tunnel's source endpoint.

Interface

 

 

 

Termination Type

Select the termination type (Domain name or IP address), which a

 

remote endpoint can use.

 

 

Termination

Enter the remote gateway's IP address or domain name depending on the

IP/Name

termination type selected. When Domain Name is configured, ensure that

 

DNS Proxy is configured with the appropriate DNS Server IP address.

 

 

Shared Key

Enter the secret key that should be used on both endpoints in order to

 

establish Phase I negotiation. The purpose of this key is for the IPSec

 

peers to authenticate each other

 

 

Tunnel Type

Only Public IPSec VPN tunnels are supported.

 

 

Phase 1 Proposal

 

 

 

Mode

This will allow a user to select the Phase 1 negotiation mode. User can

 

select between Main and Aggressive modes. In the Main mode, all

 

communications between the two endpoints of an IPSec VPN tunnel are

 

encrypted. In Aggressive mode, there is no encryption in the Phase 1

 

negotiation.

 

 

DH Group

Select the DH algorithm to generate the shared keys in a secure manner.

 

This shared key is used for deriving encryption and hash algorithm keys

 

used during Phase 1 negotiation.

 

Group 1 generates a 768-bit key

 

Group 2 generates a 1024-bit key.

 

The same DH Group must be used on both ends of an IPSec VPN tunnel.

 

 

IKE Life Duration

Enter the life duration (in seconds) of Phase 1 key. When it is expired, the

 

two IPSec peers should trigger Phase 1 negotiation again to set up a fresh

 

IPSec tunnel. The minimum life duration is 300 seconds and maximum

 

life duration is 86400 seconds.

 

 

IKE Hash

Select the algorithm that will be used to ensure that the messages

 

exchanged between the two IPSec VPN tunnel endpoints has been

 

received exactly as it was sent. In other words, a Hash algorithm is used

 

to generate a binary number by a mathematical operation using the entire

 

message. The resulting number is called a message digest. The same

 

operation is performed when the message is received, and if there has

 

been any change in the message during transit, the resulting message

 

digest number will be different and the message will be rejected. The

 

options are:

 

MD5 - a 128-bit message digest

 

SHA - a 160-bit message digest.

 

User must have exactly the same IKE Hash algorithm on both ends of a

 

VPN tunnel.

 

 

IKE Encryption

Select the encryption algorithm (DES, 3DES) that will be used to encrypt

 

the messages passed between the VPN tunnel endpoints during the Phase

 

1 negotiation. The length of the key for the 3DES algorithm is three times

Dlink DRO-210i User Guide

51

Image 51
Contents DRO-210i Table Of Contents Virtual Private Network Bold About This ManualProduct Overview Product OverviewDlink DRO-210i User Guide Hardware Details DRO-210i Package ContentsFront Panel Rear Panel Routing Software FeaturesVPN Tools Interfaces Port ConfigurationOptional Port Configuration Disabled WAN2/DMZForgot LAN IP ? LAN SettingsLAN Interface DMZ InterfaceDMZ Settings WAN InterfaceMaximum Transmission Unit Dhcp Settings for WAN1 Interface Static ModeDynamic Mode IP Settings for WAN1 InterfaceUnnumbered Interfaces PPPoE ModePPPoE Settings for WAN1 Interface DHCP, DNS and Time DHCP, DNS and TimeDhcp Dhcp ServerDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy DNS Proxy SettingsTime System Time SettingsRouting RoutingStatic Routing Dynamic RoutingStatic Routing RIP Settings Policy Based Routing Routing TablePolicy Based Routing Routing TableTo the same destination High Availability Auto BackupBackup Configuration High AvailabilityLoad Balancing Configuration Load BalancingEthernet Link Detection Ethernet WAN Link Detection NAT NAT Interface ConfigurationNAT Interface Configuration Network Address TranslationNAT Configuration NAT ConfigurationNAT Exception Virtual Server NAT ExceptionVirtual Server/NAPT SIP-ALG SIP ALG ConfigurationNAT Session Table NAT TableFirewall Policies Interface ConfigurationFirewall Interface Configuration FirewallPolicy Rules Policy RulesInbound Policies Permitted ServicesInbound Policies Permitted Services Inbound PoliciesOutbound Policies IP Permitted RulesAdd Permitted IP Rule Outbound Policies Outbound PoliciesAdd Blocked IP Rule Blocked ServicesOutbound Policies Service Blocked Rule IP Blocked RulesTrusted Domain Domain FilterUntrusted Domain Outbound Policies Untrusted DomainActiveX Filter Web FilterJava Filter Cookie FilterKeyword Filter Keyword ExceptionFile Extension Filter Blocking Log Table MAC FilterBlocking Log Add Blocked MAC AddressIntrusion Detection IDS ConfigurationIDS Configuration Black List Table Intrusion LogBlack List Intrusion Log TableVirtual Private Network Virtual Private NetworkIPSec Tunnel IPSec Tunnel or PassthroughPeer-To-Peer IPSec PassthroughVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server IPSec Server ConfigurationsMaximum life duration is 86400 seconds Tunnel Remote ID Configuration Tunnel TableLimitation IPSec Status IPSec StatusIPSec Log Table IPSec LogHTB QoS Configurations Quality of ServiceClass Configuration Quality of ServiceQuality of Service QoS Filter Configurations Filter ConfigurationTOS/DiffServ Type Of Service/DiffServQuality of Service Device Info AdministrationAdministration Device InformationTraffic Statistics Session LogTraffic Statistics System Log Password ChangeSysLog Session LogSystem Change PasswordPassword Recovery SystemUpload/Download Update Firmware/ConfigurationPing Test Remote AccessRemote Access Ping TestAdministration Dlink DRO-210i User Guide Frequently Asked Questions Frequently Asked QuestionsGeneral DHCP, DNS Q6. What is the purpose of Dhcp Server Auto Configuration?High Availability RoutingFirewall Frequently Asked Questions 11.6 NAT 11.7 VPN Q21. What are the call features supported by SIP-ALG?11.8 QoS Frequently Asked Questions

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.