NETGEAR DG834G Reference Manual page 159

Adsl modem wireless router
Hide thumbs Also See for DG834G:
Table of Contents

Advertisement

Single PC - no Subnet
endpoint. If this option is selected, no additional data is required. The typical application is a
PC running the VPN client at the remote end.
Single address
address on the remote LAN. Typically, this setting is used when you wish to access a server on
the remote LAN.
Range address
finish IP address in the "Finish IP address" field. This must be an address range used on the
remote LAN.
Subnet address
network mask in the "Subnet Mask" field.
Any—any outgoing traffic from the "Local IP" computers will trigger an attempted VPN
connection to the remote VPN endpoint. Please be sure you want this option before selecting
it.
The remote VPN endpoint must have these IP addresses entered as its "Local" addresses.
IKE. Direction/Type
traffic. Select the desired option.
Responder only—incoming connections are allowed, but outgoing connections will be
blocked.
Initiator and Responder
Exchange Mode
ensure the remote VPN endpoint is set to use "Main Mode".
Diffie-Hellman (DH) Group
DH Group setting determines the number of bit size used in the exchange. This value must match
the value used on the remote VPN Gateway.
Local Identity Type—select the desired option to match the "Remote Identity Type" setting on the
remote VPN endpoint.
WAN IP Address
Fully Qualified Domain Name
Fully Qualified User Name
Local Identity Data—enter the data for the selection above. (If WAN IP Address is selected, no
input is required.)
Virtual Private Networking
Reference Manual for the ADSL Modem Wireless Router DG834G
select this option if there is no LAN (only a single PC) at the remote
Enter an IP address in the "Single/Start IP address" field. This must be an
enter the starting IP address in the "Single/Start IP address" field, and the
enter an IP address in the "Single/Start IP address" field, and the desired
this setting is used when determining if the IKE policy matches the current
both incoming and outgoing connections are allowed.
the Diffie-Hellman algorithm is used when exchanging keys. The
your Internet IP address.
your domain name.
your name, E-mail address, or other ID.
v1.3, March 2007
8-41

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents