Linksys RV042 manual VPN Client to Gateway, Advanced

Page 47

Chapter 4

Advanced Configuration

If MD5 is selected, the Authentication Key is 32-bit, which requires 32 hexadecimal values. If you do not enter enough hexadecimal values, then the rest of the Authentication Key will be automatically completed with zeroes until it has 32 hexadecimal values. If SHA is selected, the Authentication Key is 40-bit, which requires 40 hexadecimal values. If you do not enter enough hexadecimal values, then the rest of the Authentication Key will be automatically completed with zeroes until it has 40 hexadecimal values. Make sure both ends of the VPN tunnel use the same Authentication Key.

Advanced

For most users, the settings on theVPN page should suffice; however, the Router provides advanced IPSec settings for advanced users using the IKE with Preshared Key mode. Click Advanced to view the Advanced settings.

Advanced

Aggressive Mode  There are two types of Phase 1 exchanges, Main Mode and Aggressive Mode.

Aggressive Mode requires half of the main mode messages to be exchanged in Phase 1 of the SA exchange. If network security is preferred, leave the Aggressive Mode check box unchecked (Main Mode will be used). If network speed is preferred, select Aggressive Mode. If you select one of the Dynamic IP types for the Remote Security Gateway Type setting, then Main Mode will be unavailable, so Aggressive Mode will be used.

Compress (Support IP Payload Compression Protocol (IP Comp))  IP Payload Compression is a protocol that reduces the size of IP datagrams. Select this option if you want the Router to propose compression when it initiates a connection. If the responders reject this proposal, then the Router will not implement compression. When the Router works as a responder, it will always accept compression, even if compression is not enabled.

Keep-Alive Keep-Alive helps maintain IPSec VPN tunnel connections. If a connection is dropped and detected, it will be re-established immediately. Select this option to use this feature.

AH Hash Algorithm  The AH (Authentication Header) protocol describes the packet format and default standards for packet structure. With the use of AH as the security protocol, protection is extended forward into the IP header to verify the integrity of the entire packet by use

of portions of the original IP header in the hashing process. Select this option to use this feature. Then select MD5 or SHA1. MD5 produces a 128-bit digest to authenticate packet data. SHA produces a 160-bit digest to authenticate packet data. Both sides of the tunnel should use the same algorithm.

NetBIOS Broadcast  Select this option to allow NetBIOS traffic to pass through the VPN tunnel. By default, the Router blocks this traffic.

NAT Traversal  Select this option to use this feature. Both the IPSec initiator and responder must support the mechanism for detecting the NAT router in the path and changing to a new port, as defined in RFC 3947.

Dead Peer Detection (DPD)  When DPD is enabled, the Router will send periodic HELLO/ACK messages to check the status of the VPN tunnel (this feature can be used only when both peers or VPN devices of the VPN tunnel use the DPD mechanism). Once a dead peer has been detected, the Router will disconnect the tunnel so the connection can be re-established. Specify the interval between HELLO/ACK messages (how often you want the messages to be sent). DPD is enabled by default, and the default interval is 10 seconds.

Click Save Settings to save your changes, or click Cancel Changes to undo them.

VPN > Client to Gateway

Use this screen to create a new tunnel between a VPN device and a remote computer using third-party VPN client software, such as TheGreenBow or VPN Tracker.

10/100 4-Port VPN Router

40

Image 47
Contents 10/100 4-Port VPN Router Online Resources About This GuideAbout This Guide Icon DescriptionsTable of Contents Ddns Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Appendix a TroubleshootingAppendix D IPSec NAT Traversal Appendix F Firmware UpgradeAppendix H Specifications Appendix G Trend Micro ProtectLink Gateway ServiceAppendix L Contact Information Appendix I Warranty InformationAppendix K Regulatory Information Introduction ChapterChapter Introduction Computer using VPN client software to VPN Router Product Overview Chapter Product OverviewCable Connections Chapter InstallationInstallation Physical InstallationInstallation Overview Chapter Advanced ConfigurationAdvanced Configuration How to Access the Web-Based UtilityTrend Micro ProtectLink Gateway ConfigurationSystem Information Port StatisticsLog Setting Status Network Setting StatusFirewall Setting Status VPN Setting StatusNetwork Setup Tab NetworkLAN Setting WAN Connection Type Dual-WAN/DMZ SettingPptp Point-to-Point Tunneling Protocol PPPoE Point-to-Point Protocol over EthernetHeart Beat Signal Setup PasswordTime Setup TimeSetup DMZ Host PasswordPort Triggering Setup Tab ForwardingForwarding Port Range ForwardingUPnP Setup UPnPAdd Range Setup One-to-One NATSetup MAC Clone One-to-One NATDynDNS.org Setup DdnsMAC Clone WAN1/2Oray.net PeanutHull Ddns Setup Advanced RoutingAdvanced Routing Dynamic RoutingStatic Routing Dhcp SetupStatic IP SetupDynamic IP Dual-WAN Smart Link BackupDhcp Status StatusLoad Balance Network Service DetectionProtocol Binding System Management Bandwidth ManagementBandwidth WAN1/2 Rate Control Bandwidth ManagementMaximum Bandwidth provided by ISP Bandwidth Management TypePriority System Management SnmpPing System Management DiagnosticDiagnostic DNS Name LookupFirmware Download Factory DefaultFirmware Upgrade System Management RestartBasic Per Port Config Port Management Port SetupImport Configuration File Export Configuration FileGeneral Port Management Port StatusFirewall General Port StatusRestrict WEB Features Firewall Access RulesServices Access RulesAdd a New Access Rule Scheduling Firewall Content FilterSummary Content FilterProtectLink VPN SummaryClient to Gateway GroupVPN StatusGateway to Gateway VPN Clients Status Local Group SetupVPN Gateway to Gateway Add a New TunnelLocal Security Group Type Remote Security Gateway Type Remote Group SetupRemote Security Group Type IPSec SetupIKE with Preshared Key Keying Mode Manual Advanced VPN Client to GatewayTunnel No The tunnel number is automatically generated TunnelRemote Client Remote Client SetupGroup VPN Default is Domain NameFQDN Keying Mode Manual Tunnel Only VPN VPN Client Access Certificate Management VPN Client AccessVPN VPN Pass Through VPN Client UsersPptp Server VPN Pptp ServerLog System Log VPN Pass ThroughMail Log SettingSystem Log SyslogLog System Statistics Wizard Basic SetupObtain an IP automatically Minutes PPPoEAccess Rule Setup Select the Log Rule Linksys Web Site SupportLogout ManualAppendix a Appendix a TroubleshootingTroubleshooting Windows 2000, XP, or Vista Appendix BAppendix B Linksys QuickVPN forClick Add to list Click Save Settings Linksys QuickVPN Client Installation and ConfigurationInstall from the CD-ROM Click the VPN Client Access tabLinksys QuickVPN Connection Install the Client CertificateClick Business Click Router/VPN Solutions Download from the InternetVersion Number of Linksys QuickVPN Confirm New Password Re-enter your new passwordBefore You Begin Configuration of the RVL200Appendix C Appendix C Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV042RV042 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix C Appendix D IPSec NAT Traversal Configuration of ScenarioConfiguration of Router a Appendix DIPSec NAT Traversal Configuration of Router BClick the One-to-One NAT tab One-to-One NAT Rule on NAT 2 RV042One-to-One NAT Rule on NAT 1 RV042 Configuration of Router a Appendix D Bandwidth Management Creation of New ServicesAppendix E Appendix E Bandwidth ManagementCreation of New Bandwidth Management Rules Alternative Firmware Upgrade Option Appendix F Firmware UpgradeFirmware Upgrade Upgrade the FirmwareFirmware Upgrade System Summary Appendix G Trend Micro ProtectLink Gateway ServiceHow to Purchase, Register, or Activate the Service Appendix GProtectLink How to Use the ServiceWeb Protection ProtectLink Web ProtectionLicense ProtectLink Email ProtectionProtectLink License Email ProtectionAppendix G Appendix H Appendix H SpecificationsSpecifications Exclusions and Limitations Warranty InformationObtaining Warranty Service AppendixTechnical Support Warranty InformationSoftware Licenses Appendix JAppendix J Software License Agreement Software in Linksys ProductsSoftware License Agreement SchedulePreamble Appendix J END of Terms and Conditions Original SSLeay License OpenSSL LicenseAppendix J Regulatory Information Appendix KDansk Danish Miljøinformation for kunder i EU Appendix K Norsk Norwegian Miljøinformasjon for kunder i EU Appendix K Contact Information Appendix L
Related manuals
Manual 26 pages 18.43 Kb