Virtual Private Network

 

that of DES key and hence it is more secure. User must select exactly the

 

same IKE Encryption algorithm on both ends of a VPN tunnel.

 

 

Phase 2 Proposal

 

 

 

PFS Mode

Select the mode that will be used for IPSec Perfect Forward Secrecy (PFS).

 

(Group 1, Group 2, Disabled).

 

Group 1 uses 768-bit prime number

 

Group 2 uses 1024-bit prime number

 

Disable disables the PFS mode.

 

User must use exactly the same PFS mode on both ends of the VPN

 

tunnel.

IPSec Operation Select the IPSec transform that will be applied to packets that are sent between the two endpoints of a VPN tunnel.

ESP - specifies that the entire packet will be encrypted (using DES, 3DES or AES algorithm, as selected in ESP Transform field) and authenticated (using MD5 or SHA algorithm, as selected in ESP Authentication field).

AH - specifies that only the authentication algorithm (MD5 or SHA, as selected in the AH transform field) will be used. When AH is selected, the data portion of packets sent between the two endpoints of a VPN tunnel will not be encrypted.

IPSec Life Duration Enter the IPSec Life Duration (in seconds). It is used for life duration of Phase 2 key. When this timer expires, the two peers should trigger Phase 2 negotiation again to set up a new Phase 2 key. The minimum life duration is 180 seconds and maximum life duration is 86400 seconds.

ESP Transform

Select the ESP transform encryption algorithm (Null, DES, 3DES and

 

AES) to be used when ESP is selected as the IPSec Operation. User must

 

select the same ESP transform encryption algorithm on both ends of a

 

VPN tunnel.

 

 

ESP Auth

Select the ESP authentication algorithm (Null, MD5, and SHA) to be used

 

when ESP is selected as IPSec Operation. The user needs to use the same

 

ESP authentication algorithm on both ends of a VPN tunnel.

 

 

AH Transform

Select the AH authentication algorithm (MD5, SHA) to be used when AH

 

is selected as the IPSec Operation. The user needs to use the same AH

 

authentication method on both ends of a VPN tunnel.

 

 

Target Host Range

 

 

 

Type

Select the type of network definition for the range of IP addresses on the

 

remote LAN that will access the VPN. Only the Subnet type is supported.

Target Network Address

Enter IP address range of the remote host machines that can be accessible from a VPN tunnel. This is specified as a combination of network address and the subnet mask. e.g. when the user needs to access remote machines with IP address in the range of 192.168.20.1 to 192.168.20.16 , then he/she can specify this range as 192.168.20.1/28.

Note: The user has to specify a proper routing entry in the routing page for the

￿remote network address. For example, if the remote network address range is 192.168.20.1 / 28 , then the user can specify the route entry with destination address

Dlink DRO-210i User Guide

52

Page 52
Image 52
D-Link DRO-210i manual Same IKE Encryption algorithm on both ends of a VPN tunnel

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.