Contents v
G
ATMP configuration............................................ 4-15
Encryption Support ...................................................... 4-17
MS-CHAP V2 and 128-bit strong encryption ......... 4-18
ATMP/PPTP Default Profile............................................ 4-18
VPN QuickView ............................................................ 4-20
Dial-Up Networking for VPN........................................... 4-21
Installing Dial-Up Networking............................... 4-21
Creating a new Dial-Up Networking profile............ 4-22
Configuring a Dial-Up Networking profile............... 4-23
Connecting using Dial-Up Networking................... 4-24
Allowing VPNs through a Firewall................................... 4-24
PPTP example.................................................... 4-26
ATMP example................................................... 4-28
Windows Networking Broadcasts................................... 4-31
Chapter 5 — Internet Key Exchange (IKE) IPsec
Key Management for VPNs ...................................5-1
Overview....................................................................... 5-1
Internet Key Exchange (IKE) Configuration........................ 5-2
Adding an IKE Phase 1 Profile............................... 5-4
Changing an IKE Phase 1 Profile........................... 5-7
Key Management........................................................... 5-8
Advanced IPsec Options..................................... 5-11
IPsec WAN Configuration Screens ................................. 5-18
IPsec Manual Key Entry................................................ 5-19
VPN Quickview................................................... 5-20
WAN Event History Error Reporting ...................... 5-21
Chapter 6 — IP Setup ...............................................................6-1
IP Setup........................................................................ 6-2
IP subnets........................................................... 6-4
Static routes ....................................................... 6-6
RIP-2 MD5 Authentication............................................. 6-10
Overview........................................................... 6-10