Efficient Networks® 5800 Series

Chapter 3: Additional Features

User Reference Guide

 

1.IPSec Policy Name: Enter a logical name for the IPSec policy. The name you choose is of no consequence to the other IPSec party.

2.Peer Binding: Specify the remote IKE peer to which this policy shall apply. This peer must be already defined with the IKE Peer Definition screen.

3.IPSec Proposal Bindings: Specify an IKE IPSec proposal to be used with this policy. The IKE IPSec proposal must be already defined with the IKE IPSec Proposal Definition screen.

4.PFS Group: Select the Perfect Forward Secrecy negotiation and Diffie-Hellman group to be used for each rekey. Perfect Forward Secrecy enhances the security of the key exchange. In the event of a key becoming compromised, only the data protected by that compromised key becomes vulnerable. You can choose None, Group 1 or Group 2.

5.IP Protocol: Specify a protocol to be used with this policy. You can also enable any protocol to be used by selecting “all”.

6.Source IP Address: Enter the IP address of the local area network that will use this policy. This will usually be the IP address assigned to the network local to your router.

7.Source Subnet Mask: Enter the subnet mask of the local area network that will use this policy. This will usually be the subnet mask assigned to the network local to your router.

8.Destination IP Address: Enter the IP address of the remote private network to which your router will connect using this policy.

9.Destination Subnet Mask: Enter the subnet mask of the remote private network to which your router will connect using this policy.

10.Source Port: Enter the port that will be the source of TCP/UDP traffic under this policy. You can specify All ports, a port number, or an IP application associated with a particular port. Because port numbers are TCP and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP (see Step 5: IP Protocol).

11.Destination Port: Enter the port that will be the destination of TCP/ UDP traffic under this policy. You can specify All ports, a port number, or an IP application associated with a particular port.

12.Click on Save IKE Settings to establish your IKE IPSec policy and return to the home screen.

Efficient Networks®

Page 3-29

Page 61
Image 61
Efficient Networks 5800 manual Efficient Networks

5800 specifications

The Efficient Networks 5800 is a prominent solution in the world of networking, specifically designed to cater to both residential and business connectivity needs. This versatile networking device combines performance, reliability, and advanced technology to deliver superior internet experiences.

One of the main features of the Efficient Networks 5800 is its robust VDSL2 capabilities. As an evolution of DSL technology, VDSL2 allows for higher data rates and improved performance over copper lines. This is particularly beneficial for areas where fiber optic connections are not readily available. The device supports multiple VDSL profiles, enabling it to adapt to various network conditions and requirements.

In addition to VDSL2, the Efficient Networks 5800 supports vectoring technology. This feature significantly reduces crosstalk interference among multiple VDSL lines, resulting in enhanced data transmission speeds and stability. This is crucial for customers who demand consistent high-speed internet for applications such as streaming, gaming, and video conferencing.

The Efficient Networks 5800 also exhibits advanced management features. With support for TR-069, service providers can remotely manage and configure the device, allowing for quicker troubleshooting and streamlined customer support. This reduces the need for on-site visits and enhances the overall customer experience.

Another characteristic worth noting is its dual-band Wi-Fi capabilities. The device operates on both the 2.4 GHz and 5 GHz frequency bands, allowing for optimal wireless connectivity. Users can enjoy reduced latency and improved speeds for devices connected to the 5 GHz band while simultaneously maintaining compatibility with legacy devices on the 2.4 GHz band.

Security features are also paramount in the Efficient Networks 5800. The device encompasses the latest encryption protocols to secure wireless connections and protect sensitive data from unauthorized access. With built-in firewalls and parental control settings, users can manage their network security effectively.

Additionally, the design of the Efficient Networks 5800 emphasizes heat dissipation and airflow, ensuring long-term reliability and performance. The compact and sleek form factor allows for easy placement in both home and office environments.

In summary, the Efficient Networks 5800 stands out as a powerful and flexible networking device boasting advanced VDSL2 and vectoring technologies, comprehensive management capabilities, dual-band Wi-Fi support, robust security features, and a user-friendly design. Its versatility makes it an ideal choice for both residential and business users looking for efficient and reliable connectivity solutions.