Draytek VigorIPPBX 3510 User Manual page 188

Hide thumbs Also See for VigorIPPBX 3510:
Table of Contents

Advertisement

User Name
Password
PPP Authentication
VJ compression
IKE Authentication
Method
IPSec Security Method
Medium
Advanced
VigorIPPBX 3510 Series User's Guide
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above.
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above.
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above. PAP/CHAP is the most
common selection due to wild compatibility.
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above. VJ Compression is used for
TCP/IP protocol header compression. Normally set to Yes to
improve bandwidth utilization.
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) - Select one predefined Profiles set
in the VPN and Remote Access >>IPSec Peer Identity.
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy.
Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means
payload (data) will be encrypted and authenticated. Select
from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
Specify mode, proposal and key life of each IKE phase,
Gateway etc.
The window of advance setup is shown as below:
180

Advertisement

Table of Contents
loading

Table of Contents