Vigor2820 Series User’s Guide
139
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must:
Specify the IPSec policy to be definitely applied on the
L2TP connection.
User Name
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
Password
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
PPP Authentication
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above. PAP/CHAP is the most
common selection due to wild compatibility.
VJ compression
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above. VJ Compression is used
for TCP/IP protocol header compression. Normally set to
Yes
to improve bandwidth utilization.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key
- Input 1-63 characters as pre-shared key.
Digital Signature (X.509)
- Select one predefined Profiles set
in the
VPN and Remote Access >>IPSec Peer Identity
.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy.
Medium
Authentication Header (AH)
means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)-
means
payload (data) will be encrypted and authenticated. Select
from below:
DES without Authentication
-Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-
Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication
-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-
Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication
-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-
Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
Advanced
Specify mode, proposal and key life of each IKE phase,
Gateway etc.
The window of advance setup is shown as below:
Summary of Contents for VIGOR2820 series
Page 1: ...Vigor2820 Series ADSL2 2 Security Firewall User s Guide Version 2 1 Date 2008 10 13...
Page 8: ......
Page 28: ...Vigor2820 Series User s Guide 20 This page is left blank...
Page 40: ...Vigor2820 Series User s Guide 32 This page is left blank...
Page 232: ...Vigor2820 Series User s Guide 224 This page is left blank...