
Prestige 794M User’s Guide
Table 44 VPN Rules (IKE): Add Policy (continued)
LABEL | DESCRIPTION |
|
|
Enter your | |
| communicating party during a phase 1 IKE negotiation. It is called |
| because you have to share it with another party before you can communicate |
| with them over a secure connection. |
| Type from 8 to 31 |
| |
| x), which is not counted as part of the 16 to 62 character range for the key. For |
| example, in "0x0123456789ABCDEF", 0x denotes that the key is hexadecimal |
| and 0123456789ABCDEF is the key itself. |
| Note: Both ends of the VPN tunnel must use the same pre- |
| shared key. |
| You will receive a PYLD_MALFORMED (payload malformed) packet if the same |
| |
Apply | Click Apply to save the changes. |
|
|
Cancel | Click Cancel to discard all changes and return to the main VPN screen. |
7.4 L2TP
L2TP (Layer 2 Tunneling Protocol) is another tunneling protocol to support VPN. L2TP allows a PPP session to travel through the Internet and a user to access a corporate network.
Click VPN and L2TP to display the summary screen.
Figure 60 VPN: L2TPThe following table describes the labels in this screen.
Table 45 | VPN: PPTP | |
|
|
|
LABEL |
| DESCRIPTION |
|
|
|
Enable |
| Select this option to activate this VPN rule. |
|
|
|
Disable |
| Select this option to deactivate this VPN rule. |
|
|
|
Name |
| This field displays the descriptive name for the VPN rule. |
|
|
|
Type |
| This field displays whether the Prestige acts as a client (Dialout) or server (Dialin) |
|
| for the VPN rule. |
87 | Chapter 7 VPN |