Draytek Vigor3200 Series User Manual page 221

Multi-wan security router
Hide thumbs Also See for Vigor3200 Series:
Table of Contents

Advertisement

User Name
Password
PPP Authentication
VJ compression
IKE Authentication
Method
IPSec Security Method
Advanced
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above.
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above.
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above. PAP/CHAP is the most common
selection due to wild compatibility.
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above. VJ Compression is used for TCP/IP
protocol header compression. Normally set to Yes to improve
bandwidth utilization.
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) - Select one predefined Profiles set
in the VPN and Remote Access >>IPSec Peer Identity.
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Medium AH (Authentication Header) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
Specify mode, proposal and key life of each IKE phase,
Gateway, etc.
The window of advance setup is shown as below:
211
Vigor3200 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents