The preferred way to do this is with automatic keying using the Internet Key Exchange Protocol (IKE). This requires that your ISP or firewall allows traffic for TCP port 500. Check with your ISP or network administrator if you are not sure if traffic for TCP port 500 is allowed.

If IKE is impossible for some reason, you can set up the router’s keys for each tunnel manually. This is described in more detail be- low (see section 4.4).

The other parameters on the VPN Settings page control how the VPN tunnel is set up. If you are creating the Secure Association (SA) using the IKE Mode (the default mode), complete the fields described in the following sections.

4.3.1 Perfect Forward Secure

This is an optional feature of IKE. When enabled (the default set- ting), this feature may impose some additional overhead on the router, but can offer added protection against an eavesdropper be- ing able to decode the encrypted data. Either setting is acceptable, but both ends of the tunnel must match settings. Click the respec- tive radio button to enable or disable this feature.

4.3.2 Encryption Protocol

The router is able to use two encryption protocols: choose NULL (no encryption), DES, or Triple DES (3DES). The same protocol must be chosen (must match) that provided by the remote device. Unless you have a need for one of the others, you should select 3DES.

46

FriendlyNET VPN Security Router

Page 46
Image 46
Asante Technologies VR2004 Series user manual Perfect Forward Secure, Encryption Protocol

VR2004 Series specifications

Asante Technologies has been at the forefront of networking solutions for businesses, and their VR2004 Series is a testament to their dedication to innovation and performance. Designed with small to medium-sized businesses in mind, this series offers a robust solution for modern networking needs. The VR2004 Series combines advanced technologies with a user-centric design, ensuring effective management and seamless connectivity.

One of the standout features of the VR2004 Series is its high-speed performance. Equipped with a powerful processor, the VR2004 enables rapid data processing and efficient handling of multiple connections. This ensures that businesses can rely on steady and fast network access, even during peak usage times. With multiple Gigabit Ethernet ports, the series caters to the bandwidth demand of various applications, from video conferencing to large file transfers.

Security is paramount in today’s digital landscape, and the VR2004 Series is equipped with advanced security features to protect business data. It includes built-in firewall capabilities, VPN support, and intrusion detection systems, allowing businesses to secure their networks against unauthorized access and cyber threats. The user-friendly interface simplifies the management of these security settings, making it accessible even for those without extensive technical knowledge.

Another significant aspect of the VR2004 Series is its scalability. Businesses can start with the basic model and expand their network capabilities as their needs grow. This flexibility is crucial in a fast-paced business environment where companies need to adapt quickly to changing demands. The VR2004 can support various configurations to accommodate growth without necessitating a complete network overhaul.

Additionally, Asante Technologies includes user-friendly management tools in the VR2004 Series. These tools allow administrators to easily monitor network performance, troubleshoot issues, and configure settings without the need for complex command-line interfaces. This level of simplicity enhances productivity and reduces downtime, ultimately leading to a more efficient operation.

In conclusion, the Asante Technologies VR2004 Series stands out for its combination of high performance, advanced security features, scalability, and user-friendly management tools. Its dedication to supporting the needs of small to medium-sized businesses makes it a formidable choice in the networking solutions market. With the VR2004 Series, organizations can enjoy reliable connectivity and robust performance, enabling them to focus on their core business activities without worrying about their network infrastructure.