Chapter 4 | Advanced Configuration |
Remote Security Gateway Type > Dynamic IP + Domain Name(FQDN)
Authentication
DomainName Enterthedomainnameforauthentication. (Once used, you cannot use it again to create a new tunnel connection.)
Dynamic IP +
The Remote Security Gateway will be a dynamic IP address, so you do not need to enter the IP address. When the Remote Security Gateway requests to create a tunnel with the Router, the Router will work as a responder.
Remote Security Gateway Type > Dynamic IP +
FQDN) Authentication
Remote Security Group Type
Select the Remote Security Group behind the Remote Gateway that can use this VPN tunnel. Select the type you want to use: IP, Subnet, or IP Range. Follow the instructions for the type you want to use.
NOTE: The Remote Security Group Type you select should match the Local Security Group Type selected on the VPN device at the other end of the tunnel.
After you have selected the Remote Security Group Type, the settings available on this screen may change, depending on which selection you have made.
IP
Only the computer with a specific IP address will be able to access the tunnel.
Remote Security Group Type > IP
IP address Enter the appropriate IP address. Subnet
The default is Subnet. All computers on the remote subnet will be able to access the tunnel.
Remote Security Group Type > Subnet
IP address Enter the IP address.
Subnet Mask Enter the subnet mask. The default is 255.255.255.0.
IP Range
Specify a range of IP addresses within a subnet that will be able to access the tunnel.
Remote Security Group Type > IP Range
IP range Enter the range of IP addresses.
IPSec Setup
In order for any encryption to occur, the two ends of a VPN tunnel must agree on the methods of encryption, decryption, and authentication. This is done by sharing a key to the encryption code. For key management, the default mode is IKE with Preshared Key.
Keying Mode Select IKE with Preshared Key or Manual. Both ends of a VPN tunnel must use the same mode of key management. After you have selected the mode, the settings available on this screen may change, depending on the selection you have made. Follow the instructions for the mode you want to use.
IKE with Preshared Key
IKE is an Internet Key Exchange protocol used to negotiate key material for Security Association (SA). IKE uses the Preshared Key to authenticate the remote IKE peer.
Phase 1 DH Group Phase 1 is used to create the SA. DH
Phase 1 Encryption Select a method of encryption: DES
Phase 1 Authentication Select a method of authentication, MD5 or SHA. The authentication method determines how the ESP packets are validated. MD5 is
10/100 | 38 |