of remote server. You can further set up Callback (CBCP)

 

function below. This feature is useful for i model only.

PPTP

Build a PPTP VPN connection to the server through the

 

Internet. You should set the identity like User Name and

 

Password below for the authentication of remote server.

IPSec Tunnel

Build an IPSec VPN connection to the server through Internet.

L2TP with …

Build a L2TP VPN connection through the Internet. You can

 

select to use L2TP alone or with IPSec. Select from below:

 

None: Do not apply the IPSec policy. Accordingly, the VPN

 

connection employed the L2TP without IPSec policy can be

 

viewed as one pure L2TP connection.

 

Nice to Have: Apply the IPSec policy first, if it is applicable

 

during negotiation. Otherwise, the dial-out VPN connection

 

becomes one pure L2TP connection.

 

Must: Specify the IPSec policy to be definitely applied on the

 

L2TP connection.

User Name

This field is applicable when you select ISDN, PPTP or L2TP

 

with or without IPSec policy above.

Password

This field is applicable when you select ISDN, PPTP or L2TP

 

with or without IPSec policy above.

PPP Authentication

This field is applicable when you select ISDN, PPTP or L2TP

 

with or without IPSec policy above. PAP/CHAP is the most

 

common selection due to wild compatibility.

VJ compression

This field is applicable when you select ISDN, PPTP or L2TP

 

with or without IPSec policy above. VJ Compression is used

 

for TCP/IP protocol header compression. Normally set to Yes

 

to improve bandwidth utilization.

IKE Authentication

This group of fields is applicable for IPSec Tunnels and L2TP

Method

with IPSec Policy.

 

Pre-SharedKey-Input 1-63 characters as pre-shared key.

 

Digital Signature (X.509) – Click this radio button to invoke

 

this function and select one predefined in the X.509 Peer ID

 

Profiles (set from VPN and Remote Access>>IPSec Peer

 

Identity).

IPSec Security Method

This group of fields is a must for IPSec Tunnels and L2TP

 

with IPSec Policy.

Medium

Authentication Header (AH) means data will be

 

authenticated, but not be encrypted. By default, this option is

 

active.

 

High (ESP-Encapsulating Security Payload)- means

 

payload (data) will be encrypted and authenticated. Select

 

from below:

 

DES without Authentication -Use DES encryption algorithm

 

and not apply any authentication scheme.

 

DES with Authentication-Use DES encryption algorithm and

 

apply MD5 or SHA-1 authentication algorithm.

 

3DES without Authentication-Use triple DES encryption

 

algorithm and not apply any authentication scheme.

 

3DES with Authentication-Use triple DES encryption

108

Vigor2910 Series User’s Guide

Page 114
Image 114
Draytek 2910 manual L2TP with …, PPP Authentication, VJ compression, IKE Authentication, Method, Identity

2910 specifications

The DrayTek 2910 is a versatile and robust router designed primarily for small to medium-sized businesses, offering a wide array of features that cater to various networking needs. With its advanced capabilities, it delivers superior performance and flexibility for organizations that demand reliable internet connectivity.

One of the defining characteristics of the DrayTek 2910 is its dual WAN capabilities. This allows users to connect two different internet service providers, ensuring that the network remains operational even if one connection fails. The router can automatically switch between the WANs, providing seamless failover and load balancing. This feature is essential for businesses that require constant uptime and reliability.

The DrayTek 2910 is equipped with multiple Ethernet ports, enabling it to support various devices and create a robust local area network (LAN). The router includes VLAN support, which allows for the segmentation of the network into different virtual networks, enhancing security and performance by isolating sensitive data traffic.

Another notable aspect of the DrayTek 2910 is its comprehensive security features. It includes a built-in firewall, which protects the network from external threats and unauthorized access. The router supports various protocols, including VPN (Virtual Private Network), allowing secure remote access to the network. This capability is particularly beneficial for businesses with remote workers or those needing secure connections for branch offices.

DrayTek has also integrated advanced Quality of Service (QoS) features in the 2910, which prioritize bandwidth allocation to critical applications, ensuring that essential services receive the needed resources. This is crucial for maintaining the performance of VoIP (Voice over Internet Protocol) calls and video conferencing tools, which are increasingly vital in today’s business environment.

In terms of management, the DrayTek 2910 offers easy configuration through a user-friendly web interface, allowing administrators to set up and monitor the network with minimal effort. The device also supports TR-069 for remote management, enabling service providers to configure and monitor the router without requiring an on-site visit.

Overall, the DrayTek 2910 stands out for its blend of reliability, security, and performance, making it an excellent choice for businesses looking to enhance their networking capabilities while ensuring a secure and efficient operation. With its rich set of features and technologies, the DrayTek 2910 continues to be a preferred router for many organizations worldwide.