Draytek Vigor2850 Series User Manual page 225

Vdsl2 security firewall
Hide thumbs Also See for Vigor2850 Series:
Table of Contents

Advertisement

authentication of remote server.
IPSec Tunnel - Build an IPSec VPN connection to the
server through Internet.
L2TP with IPSec Policy - Build a L2TP VPN connection
through the Internet. You can select to use L2TP alone or
with IPSec. Select from below:
None: Do not apply the IPSec policy. Accordingly,
the VPN connection employed the L2TP without
IPSec policy can be viewed as one pure L2TP
connection.
Nice to Have: Apply the IPSec policy first, if it is
applicable during negotiation. Otherwise, the dial-out
VPN connection becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on
the L2TP connection.
User Name - This field is applicable when you select,
PPTP or L2TP with or without IPSec policy above.
Password - This field is applicable when you select PPTP
or L2TP with or without IPSec policy above.
PPP Authentication - This field is applicable when you
select, PPTP or L2TP with or without IPSec policy above.
PAP/CHAP is the most common selection due to wild
compatibility.
VJ compression - This field is applicable when you select
PPTP or L2TP with or without IPSec policy above. VJ
Compression is used for TCP/IP protocol header
compression. Normally set to Yes to improve bandwidth
utilization.
IKE Authentication Method - This group of fields is
applicable for IPSec Tunnels and L2TP with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared
key.
Digital Signature (X.509) - Select one predefined
Profiles set in the VPN and Remote Access >>IPSec
Peer Identity.
IPSec Security Method - This group of fields is a must for
IPSec Tunnels and L2TP with IPSec Policy.
Medium AH (Authentication Header) means data
will be authenticated, but not be encrypted. By default,
this option is active.
High (ESP-Encapsulating Security Payload)- means
payload (data) will be encrypted and authenticated.
Select from below:
DES without Authentication -Use DES encryption
algorithm and not apply any authentication scheme.
DES with Authentication-Use DES encryption
algorithm and apply MD5 or SHA-1 authentication
algorithm.
3DES without Authentication-Use triple DES
encryption algorithm and not apply any authentication
215
Vigor2850 Series User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigor2850nVigor2850vnVigor2850i

Table of Contents