Vpn Tunnel Configuration Parameters For Automatic Keying - Asus SL6000 Setup Instructions

Hide thumbs Also See for SL6000:
Table of Contents

Advertisement

Chapter 6. Configuring VPN
6.2.1

VPN Tunnel Configuration Parameters for Automatic Keying

Table 9.4. VPN tunnel configuration parameters using pre-shared key for key management
Options
VPN Connection Settings
ID
Add New
Rule number
Name
Enable
Disable
Move to
This option allows you to set a priority for this rule. The VPN service in SL-6000 acts on packets based
on the priority of the rule, with 1 being the highest priority. Set a priority by specifying a number for its
position in the list of rules:
1
Other numbers
Local Secure Group
This option allows you to set the local secure network to which this rule should apply. This option allows
you to apply this rule inclusively on all computers in the internal network. Use the "Type" drop-down list
to select one of the following:
IP Address
IP Address
Subnet
Subnet Address
Subnet Mask
IP Range
56
Solwise Asus SL6000 ADSL Ethernet Router User's Guide
them to configure basic Access Rule that will be used to establish a
tunnel from local secure group to remote secure group with basic
parameters.
Options in this screen allow you to:
Add an Access List, and set basic parameters for it
Modify an Access List
Delete an existing Access List
Table below describes the VPN tunnel configuration parameters
using pre-shared key as key management mode.
What it means/ When to use
Click on this option to add a new VPN rule.
Select a rule from the drop-down list, to modify its
attributes.
Enter a unique name, preferably a meaningful
name that signifies the tunnel connection. Note
that only alphanumeric characters are allowed in
this field.
Select this radio button to enable this rule (default).
Select this radio button to disable this rule.
This number marks the highest priority.
Select other numbers to indicate the priority you
wish to assign to the rule.
This option allows you to specify an IP address on
which this rule will be applied.
Enter the appropriate IP address.
This option allows you to include all the computers
that are connected in an IP subnet. The following
fields become available for entry when this option
is selected:
Specify the appropriate network address.
Enter the subnet mask.
This option allows you to include a range of IP
addresses for applying this rule. The following

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents