D-Link DRO-210i manual Same IKE Encryption algorithm on both ends of a VPN tunnel

Page 52

Virtual Private Network

 

that of DES key and hence it is more secure. User must select exactly the

 

same IKE Encryption algorithm on both ends of a VPN tunnel.

 

 

Phase 2 Proposal

 

 

 

PFS Mode

Select the mode that will be used for IPSec Perfect Forward Secrecy (PFS).

 

(Group 1, Group 2, Disabled).

 

Group 1 uses 768-bit prime number

 

Group 2 uses 1024-bit prime number

 

Disable disables the PFS mode.

 

User must use exactly the same PFS mode on both ends of the VPN

 

tunnel.

IPSec Operation Select the IPSec transform that will be applied to packets that are sent between the two endpoints of a VPN tunnel.

ESP - specifies that the entire packet will be encrypted (using DES, 3DES or AES algorithm, as selected in ESP Transform field) and authenticated (using MD5 or SHA algorithm, as selected in ESP Authentication field).

AH - specifies that only the authentication algorithm (MD5 or SHA, as selected in the AH transform field) will be used. When AH is selected, the data portion of packets sent between the two endpoints of a VPN tunnel will not be encrypted.

IPSec Life Duration Enter the IPSec Life Duration (in seconds). It is used for life duration of Phase 2 key. When this timer expires, the two peers should trigger Phase 2 negotiation again to set up a new Phase 2 key. The minimum life duration is 180 seconds and maximum life duration is 86400 seconds.

ESP Transform

Select the ESP transform encryption algorithm (Null, DES, 3DES and

 

AES) to be used when ESP is selected as the IPSec Operation. User must

 

select the same ESP transform encryption algorithm on both ends of a

 

VPN tunnel.

 

 

ESP Auth

Select the ESP authentication algorithm (Null, MD5, and SHA) to be used

 

when ESP is selected as IPSec Operation. The user needs to use the same

 

ESP authentication algorithm on both ends of a VPN tunnel.

 

 

AH Transform

Select the AH authentication algorithm (MD5, SHA) to be used when AH

 

is selected as the IPSec Operation. The user needs to use the same AH

 

authentication method on both ends of a VPN tunnel.

 

 

Target Host Range

 

 

 

Type

Select the type of network definition for the range of IP addresses on the

 

remote LAN that will access the VPN. Only the Subnet type is supported.

Target Network Address

Enter IP address range of the remote host machines that can be accessible from a VPN tunnel. This is specified as a combination of network address and the subnet mask. e.g. when the user needs to access remote machines with IP address in the range of 192.168.20.1 to 192.168.20.16 , then he/she can specify this range as 192.168.20.1/28.

Note: The user has to specify a proper routing entry in the routing page for the

￿remote network address. For example, if the remote network address range is 192.168.20.1 / 28 , then the user can specify the route entry with destination address

Dlink DRO-210i User Guide

52

Image 52
Contents DRO-210i Table Of Contents Virtual Private Network About This Manual BoldProduct Overview Product OverviewDlink DRO-210i User Guide DRO-210i Package Contents Hardware DetailsFront Panel Rear Panel Software Features RoutingVPN Tools Port Configuration Optional Port ConfigurationDisabled WAN2/DMZ InterfacesLAN Settings LAN InterfaceDMZ Interface Forgot LAN IP ?WAN Interface DMZ SettingsMaximum Transmission Unit Static Mode Dynamic ModeIP Settings for WAN1 Interface Dhcp Settings for WAN1 InterfacePPPoE Mode Unnumbered InterfacesPPPoE Settings for WAN1 Interface DHCP, DNS and Time DhcpDhcp Server DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy Settings DNS ProxySystem Time Settings TimeRouting RoutingDynamic Routing Static RoutingStatic Routing RIP Settings Routing Table Policy Based RoutingRouting Table Policy Based RoutingTo the same destination Auto Backup Backup ConfigurationHigh Availability High AvailabilityLoad Balancing Load Balancing ConfigurationEthernet Link Detection Ethernet WAN Link Detection NAT Interface Configuration NAT Interface ConfigurationNetwork Address Translation NATNAT Configuration NAT ConfigurationNAT Exception NAT Exception Virtual ServerVirtual Server/NAPT SIP ALG Configuration SIP-ALGNAT Table NAT Session TableInterface Configuration Firewall Interface ConfigurationFirewall Firewall PoliciesPolicy Rules Policy RulesPermitted Services Inbound Policies Permitted ServicesInbound Policies Inbound PoliciesIP Permitted Rules Outbound PoliciesAdd Permitted IP Rule Outbound Policies Outbound PoliciesBlocked Services Outbound Policies Service Blocked RuleIP Blocked Rules Add Blocked IP RuleDomain Filter Untrusted DomainOutbound Policies Untrusted Domain Trusted DomainWeb Filter Java FilterCookie Filter ActiveX FilterKeyword Exception Keyword FilterFile Extension Filter MAC Filter Blocking LogAdd Blocked MAC Address Blocking Log TableIDS Configuration Intrusion DetectionIDS Configuration Intrusion Log Black ListIntrusion Log Table Black List Table Virtual Private Network Virtual Private NetworkIPSec Tunnel or Passthrough Peer-To-PeerIPSec Passthrough IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server Configurations IPSec ServerMaximum life duration is 86400 seconds Tunnel Table Tunnel Remote ID ConfigurationLimitation IPSec Status IPSec StatusIPSec Log IPSec Log TableQuality of Service Class ConfigurationQuality of Service HTB QoS ConfigurationsQuality of Service Filter Configuration QoS Filter ConfigurationsType Of Service/DiffServ TOS/DiffServQuality of Service Administration AdministrationDevice Information Device InfoSession Log Traffic StatisticsTraffic Statistics Password Change SysLogSession Log System LogChange Password Password RecoverySystem SystemUpdate Firmware/Configuration Upload/DownloadRemote Access Remote AccessPing Test Ping TestAdministration Dlink DRO-210i User Guide Frequently Asked Questions Frequently Asked QuestionsGeneral Q6. What is the purpose of Dhcp Server Auto Configuration? DHCP, DNSRouting High AvailabilityFirewall Frequently Asked Questions 11.6 NAT Q21. What are the call features supported by SIP-ALG? 11.7 VPN11.8 QoS Frequently Asked Questions