
Vigor3200 Series User’s Guide
210
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
User Name
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above.
Password
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above.
PPP Authentication
This field is applicable when you select, PPTP or L2TP with or
without IPSec policy above. PAP/CHAP is the most common
selection due to wild compatibility.
VJ compression
This field is applicable when you select PPTP or L2TP with or
without IPSec policy above. VJ Compression is used for TCP/IP
protocol header compression. Normally set to Yes to improve
bandwidth utilization.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) – Check the box of Digital Signature
to invoke this function. Then, specify the following items for
authentication with digital signature.
z Peer ID - Select one of the predefined Profiles set in
VPN and Remote Access >>IPSec Peer Identity.
z Local ID – Specify a local ID (Alternative Subject
Name First or Subject Name First) to be used for
Dial-in setting in the LAN-to-LAN Profile setup. This
item is optional and can be used only in IKE aggressive
mode.
Local Certificate – Select one of the profiles set in Certificate
Management>>Local Certificate.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Medium AH (Authentication Header) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
Comments to this Manuals