D-Link DRO-210i manual Maximum life duration is 86400 seconds

Page 54

Virtual Private Network

 

maximum life duration is 86400 seconds.

 

 

IKE Hash

Select the Hash algorithm that will be used to ensure that the messages

 

exchanged between the two IPSec VPN tunnel endpoints has been

 

received exactly as it was sent. In other words, a Hash algorithm is used

 

to generate a binary number by a mathematical operation using the entire

 

message. The resulting number is called a message digest. The same

 

operation is performed when the message is received, and if there has

 

been any change in the message during transit, the resulting message

 

digest number will be different and the message will be rejected. The

 

options are:

 

MD5 - a 128-bit message digest,

 

SHA - This generates a 160-bit message digest.

 

User needs to configure exactly the same IKE Hash algorithm on both

 

ends of a VPN tunnel.

 

 

IKE Encryption

Select the encryption algorithm (DES, 3DES) that will be used to encrypt

 

the messages passed between the VPN tunnel endpoints during the Phase

 

1 negotiation. The length of the key for the 3DES algorithm is three times

 

that of the DES key, and is therefore more secure. User must choose

 

exactly the same IKE Encryption algorithm on both ends of a VPN tunnel.

 

 

Phase 2 Proposal

 

 

 

PFS Mode

Select the mode that will be used for IPSec Perfect Forward Secrecy (PFS).

 

(Group 1, Group 2, Disabled).

 

Group 1 uses 768-bit prime number

 

Group 2 uses 1024-bit prime number

 

Disable disables the PFS mode.

 

User must use exactly the same PFS mode on both ends of the VPN

 

tunnel.

IPSec Operation Select the IPSec transform that will be applied to packets that are sent between the two endpoints of a VPN tunnel.

ESP - specifies that the entire packet will be encrypted (using DES, 3DES or AES algorithm, as selected in ESP Transform field) and authenticated (using MD5 or SHA algorithm, as selected in ESP Authentication field).

AH - specifies that only the authentication algorithm (MD5 or SHA, as selected in the AH transform field) will be used. When AH is selected, the data portion of packets sent between the two endpoints of a VPN tunnel will not be encrypted.

IPSec Life Duration Enter the IPSec Life Duration (in seconds). This is the life duration of Phase 2 key. When this timer expires, the two peers should trigger Phase 2 negotiation again to set up a new Phase 2 key. The minimum life duration is 180 seconds and maximum life duration is 86400 seconds.

ESP Transform

Select the ESP transform encryption algorithm (Null, DES, 3DES and

 

AES) to be used when ESP is selected as the IPSec Operation. User needs

 

to select the same ESP transform encryption algorithm on both ends of a

 

VPN tunnel.

 

 

ESP Auth

Select the ESP authentication algorithm (Null, MD5 and SHA) to be used

 

when ESP is selected for IPSec Operation. The user needs to use the same

Dlink DRO-210i User Guide

54

Image 54
Contents DRO-210i Table Of Contents Virtual Private Network About This Manual BoldProduct Overview Product OverviewDlink DRO-210i User Guide DRO-210i Package Contents Hardware DetailsFront Panel Rear Panel Software Features RoutingVPN Tools Disabled WAN2/DMZ Port ConfigurationOptional Port Configuration InterfacesDMZ Interface LAN SettingsLAN Interface Forgot LAN IP ?DMZ Settings WAN InterfaceMaximum Transmission Unit IP Settings for WAN1 Interface Static ModeDynamic Mode Dhcp Settings for WAN1 InterfacePPPoE Mode Unnumbered InterfacesPPPoE Settings for WAN1 Interface Dhcp Server DHCP, DNS and TimeDhcp DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy Settings DNS ProxySystem Time Settings TimeRouting RoutingStatic Routing Dynamic RoutingStatic Routing RIP Settings Routing Table Routing TablePolicy Based Routing Policy Based RoutingTo the same destination High Availability Auto BackupBackup Configuration High AvailabilityLoad Balancing Configuration Load BalancingEthernet Link Detection Ethernet WAN Link Detection Network Address Translation NAT Interface ConfigurationNAT Interface Configuration NATNAT Configuration NAT ConfigurationNAT Exception Virtual Server NAT ExceptionVirtual Server/NAPT SIP ALG Configuration SIP-ALGNAT Table NAT Session TableFirewall Interface ConfigurationFirewall Interface Configuration Firewall PoliciesPolicy Rules Policy RulesInbound Policies Permitted ServicesInbound Policies Permitted Services Inbound PoliciesOutbound Policies IP Permitted RulesAdd Permitted IP Rule Outbound Policies Outbound PoliciesIP Blocked Rules Blocked ServicesOutbound Policies Service Blocked Rule Add Blocked IP RuleOutbound Policies Untrusted Domain Domain FilterUntrusted Domain Trusted DomainCookie Filter Web FilterJava Filter ActiveX FilterKeyword Filter Keyword ExceptionFile Extension Filter Add Blocked MAC Address MAC FilterBlocking Log Blocking Log TableIDS Configuration Intrusion DetectionIDS Configuration Intrusion Log Table Intrusion LogBlack List Black List TableVirtual Private Network Virtual Private NetworkIPSec Passthrough IPSec Tunnel or PassthroughPeer-To-Peer IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server Configurations IPSec ServerMaximum life duration is 86400 seconds Tunnel Remote ID Configuration Tunnel TableLimitation IPSec Status IPSec StatusIPSec Log IPSec Log TableQuality of Service Quality of ServiceClass Configuration HTB QoS ConfigurationsQuality of Service Filter Configuration QoS Filter ConfigurationsType Of Service/DiffServ TOS/DiffServQuality of Service Device Information AdministrationAdministration Device InfoTraffic Statistics Session LogTraffic Statistics Session Log Password ChangeSysLog System LogSystem Change PasswordPassword Recovery SystemUpdate Firmware/Configuration Upload/DownloadPing Test Remote AccessRemote Access Ping TestAdministration Dlink DRO-210i User Guide Frequently Asked Questions Frequently Asked QuestionsGeneral Q6. What is the purpose of Dhcp Server Auto Configuration? DHCP, DNSRouting High AvailabilityFirewall Frequently Asked Questions 11.6 NAT Q21. What are the call features supported by SIP-ALG? 11.7 VPN11.8 QoS Frequently Asked Questions

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.