Cradlepoint COR IBR350 Manual page 105

Hide thumbs Also See for COR IBR350:
Table of Contents

Advertisement

Figure 133: NEMO Settings
VPN
(virtual private network) tunnels are used to establish a secure connection to a remote network over a public network. For example, VPN
tunnels can be used across the Internet by an individual to connect to an office network while traveling, or by two office networks to function as
one network. The two networks set up a secure connection across the (normally) unsecure Internet by assigning VPN encryption protocols.
Cradlepoint VPN tunnels use
IPsec
(Internet Protocol security) to authenticate and encrypt packets exchanged across the tunnels. To set up a VPN
tunnel with a Cradlepoint router on one end, there must be another device (usually a router) that also supports IPsec on the other end.
IKE (Internet Key Exchange) is the security protocol in IPsec. IKE has two phases, Phase 1 and Phase 2. The router has several different security
protocol options for each phase, but the default selections will be sufficient for most users.
The VPN tunnel status page allows you to view the state of the VPN tunnels. If a tunnel fails to connect to the remote site, check the System Logs
for more information. You may double click on a cell to directly edit that information.
Figure 134: VPN Status Page
Click Add to configure a new VPN tunnel; click Edit to make changes to an existing tunnel.
Add/Edit Tunnel – General Tunnel Name: Give the tunnel a name that uniquely identifies it.
Anonymous Mode: Select to allow remote connections from any IP address.
105

Advertisement

Table of Contents
loading

Table of Contents