Prestige 334W User’s Guide
If you do not specify an Intranet DNS server on the remote network, then the VPN host must use IP addresses to access the computers on the remote network.
16.8 ID Type and Content
With aggressive negotiation mode (see Section 16.11.1), the Prestige identifies incoming SAs by ID type and content since this identifying information is not encrypted. This enables the Prestige to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. Telecommuters can use separate passwords to simultaneously connect to the Prestige from IPSec routers with dynamic IP addresses (see Section 16.17.2 for a telecommuter configuration example).
Regardless of the ID type and content configuration, the Prestige does not allow you to save multiple active rules with overlapping local and remote IP addresses.
With main mode (see Section 16.11.1), the ID type and content are encrypted to provide identity protection. In this case the Prestige can only distinguish between up to eight different incoming SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. The Prestige can distinguish up to eight incoming SAs because you can select between three encryption algorithms (DES and 3DES), two authentication algorithms (MD5 and SHA1) and two key groups (DH1 and DH2) when you configure a VPN rule (see Section 16.12). The ID type and content act as an extra level of identification for incoming SAs.
The type of ID can be a domain name, an IP address or an
| Table |
|
|
LOCAL ID TYPE | CONTENT |
|
|
IP | Type the IP address of your computer or leave the field blank to have the Prestige |
| automatically use its own IP address. |
|
|
DNS | Type a domain name (up to 31 characters) by which to identify this Prestige. |
|
|
Type an | |
|
|
The domain name or
VPN Screens |