Draytek Vigor2920n User's Guide Page 240

  • Download
  • Add to my manuals
  • Print
  • Page
    / 355
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 239
Vigor2920 Series User’s Guide
228
L2TP with IPSec Policy - Build a L2TP VPN connection
through the Internet. You can select to use L2TP alone or with
IPSec. Select from below:
None: Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
User Name
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above.
Password
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above.
PPP Authentication
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above. PAP/CHAP is the most common
selection due to wild compatibility.
VJ compression
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above. VJ Compression is used for TCP/IP
protocol header compression. Normally set to Yes to improve
bandwidth utilization.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) - Select one predefined Profiles set
in the VPN and Remote Access >>IPSec Peer Identity.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Medium AH (Authentication Header) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
Page view 239
1 2 ... 235 236 237 238 239 240 241 242 243 244 245 ... 354 355

Comments to this Manuals

No comments