Microsoft VPN

Authentication

RSA Signature requires that both VPN endpoints have valid

 

Certificates issued by a CA (Certification Authority).

 

For Pre-shared key, enter the same key value in both end-

 

points. The key should be at least 8 characters (maximum is

 

128 characters). Note that this key is used for the IKE SA only.

 

The keys used for the IPsec SA are automatically generated.

 

 

Encryption

Select the desired method, and ensure the remote VPN endpoint

 

uses the same method.

 

The 3DES algorithm provides greater security than DES, but is

 

slower.

 

If using AES, you must select the Authentication Algorithm. If

 

using DES or 3DES, this field is ignored.

 

 

Exchange Mode

Select the desired option, and ensure the remote VPN endpoint uses

 

the same mode.

 

Main Mode provides identity protection for the hosts initiating

 

the IPSec session, but takes slightly longer to complete.

 

Aggressive Mode provides no identity protection, but is quick-

 

er.

 

 

IKE SA Aggressive

This setting does not have to match the remote VPN endpoint; the

Mode

shorter time will be used. Although measured in seconds, it is

 

common to use time periods of several hours, such 28,800 seconds.

 

 

DH Group

Select the desired method, and ensure the remote VPN endpoint

 

uses the same method. The smaller bit size is slightly faster.

 

 

IKE PFS

If enabled, PFS (Perfect Forward Security) enhances security by

 

changing the IPsec key at regular intervals, and ensuring that each

 

key has no relationship to the previous key. Thus, breaking 1 key

 

will not assist in breaking the next key.

 

This setting should match the remote endpoint.

 

 

IPSec PFS

Select the desired option from the drop-down list.

 

 

81

Page 85
Image 85
TRENDnet TW100-BRV324 manual Authentication, Encryption, Exchange Mode, IKE SA Aggressive, DH Group, Ike Pfs, IPSec PFS

TW100-BRV324 specifications

The TRENDnet TW100-BRV324 is a versatile broadband router designed to provide small to medium-sized businesses with reliable networking capabilities. One of its key features is its built-in firewall security, which ensures robust protection against unauthorized access and threats from the internet. This appliance uses Stateful Packet Inspection (SPI), providing a comprehensive barrier against a variety of cyber threats.

Equipped with a DHCP server, the TW100-BRV324 simplifies IP address assignment, allowing administrators to manage network resources efficiently. The device supports both DHCP and static IP configurations, making it flexible for various network setups. Additionally, it offers VPN pass-through capabilities, allowing secure remote access for users needing to connect to the corporate network from outside.

The TW100-BRV324 is noted for its impressive NAT (Network Address Translation) capabilities, which enable multiple devices on a local network to access the internet through a single public IP address. This feature is particularly beneficial in saving costs related to IP addresses while enhancing network management. Furthermore, it boasts an integrated 4-port switch, facilitating wired connections for several devices in a local area network (LAN).

In terms of connectivity, the router supports 10/100 Mbps Ethernet, providing sufficient bandwidth for most small business applications. The device is also easy to set up, thanks to its user-friendly web-based interface, which guides users through the configuration process. This simplicity makes it suitable for individuals with varying levels of networking expertise.

The TW100-BRV324 supports multiple connection types, including DSL and cable internet, ensuring compatibility with various ISPs. Additionally, it embeds Quality of Service (QoS) features, allowing network administrators to prioritize traffic. This is crucial for ensuring that bandwidth-intensive applications, such as video conferencing and VoIP, receive the necessary resources for optimal performance.

In summary, the TRENDnet TW100-BRV324 is a robust and feature-rich router well-suited for small to medium-sized businesses. With its combination of security features, flexible configurations, and user-friendly management tools, it offers a powerful solution for those seeking reliable network performance without the need for extensive technical knowledge.