Lucom lr77 v2 Configuration Manual page 68

Table of Contents

Advertisement

Item
Remote Subnet Mask
Remote Protocol/Port
Local ID
Local Subnet
Local Subnet Mask
Local Protocol/Port
Encapsulation Mode
NAT traversal
IKE Mode
IKE Algorithm
IKE Encryption
IKE Hash
LUCOM GmbH * Ansbacher Str. 2a * 90513 Zirndorf * Tel. 09127/59 460-10 * Fax. 09127/59 460-20 * www.lucom.de
Continued from previous page
Description
Subnet mask of a network behind remote side of the tunnel.
Specifies Protocol/Port of remote side of the tunnel. The general
form is protocol/port, for example 17/1701 for UDP (protocol 17)
and port 1701. It is also possible to enter only the number of
protocol, however, the above mentioned format is preferred.
Identifier (ID) of local side of the tunnel. It consists of two parts:
a hostname and a domain-name.
IP address of a local network.
Subnet mask of a local network.
Specifies Protocol/Port of a local network. The general form is
protocol/port, for example 17/1701 for UDP (protocol 17) and
port 1701. It is also possible to enter only the number of protocol,
however, the above mentioned format is preferred.
Specifies the IPsec mode, according to the method of encap-
sulation. You can select the tunnel mode in which the entire IP
datagram is encapsulated or the transport mode in which only IP
header is encapsulated.
Enable/disables NAT address translation on the tunnel. If you
use NAT between the end points of the tunnel, then enable this
parameter.
Specifies the mode for establishing a connection (main or ag-
gressive). If you select the aggressive mode, then the router es-
tablishes the IPsec tunnel faster, but the encryption is perma-
nently set to 3DES-MD5. We recommend that you not use the
aggressive mode due to lower security!
Specifies the means by which the router selects the algorithm:
auto – The encryption and hash algorithm are selected au-
tomatically.
manual – The encryption and hash algorithm are defined
by the user.
Encryption algorithm – 3DES, AES128, AES192, AES256.
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
61
3. CONFIGURATION
Continued on next page

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the lr77 v2 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Ur5i v2

Table of Contents