D-Link DRO-250i User Manual page 80

Hide thumbs Also See for DRO-250i:
Table of Contents

Advertisement

Introduction to DRO-250i
MD5 - using MD5 message digest authentication, and SHA - using the
SHA authentication method. User must select the exact same ESP
authentication method on both ends of a VPN tunnel.
AH Transform - This drop-down menu allows user to select the
encryption algorithm that will be used when AH is selected in the IPSec
Operation drop-down menu above. User can choose between MD5 - using
MD5 message digest authentication, and SHA - using the SHA
authentication method. User must select the exact same AH authentication
method on both ends of a VPN tunnel.
Target Host Range
Type - This drop-down menu allows user to select the type of network
definition for the range of IP addresses on the remote LAN that will be
allowed to access the VPN. At the time of the writing of this manual, only
the Subnet type is supported.
Target Network Address - This specifies the remote host machines that
can be accessible from a VPN tunnel. This is specified as a combination of
Network Address and number of bitmask. e.g.: If user need to access
remote machines with a range of 192.168.20.1 to 192.168.20.16 , then user
can specify this range as 192.168.20.1 / 28.
The user has to specify a proper routing entry in the routing page for the
remote network address.
e.g.: If the remote network address range is 192.168.20.1 / 28 , then the user can
specify the route entry with destination address as 192.168.20.0 with subnet mask
255.255.255.0 and outgoing device same as that of the source interface which was
specified.
DRO-250i User Manual
79

Advertisement

Table of Contents
loading

Table of Contents