Draytek Vigor2820 Series User Manual page 168

Adsl2/2+ security firewall
Hide thumbs Also See for Vigor2820 Series:
Table of Contents

Advertisement

IPSec Tunnel
L2TP with ...
User Name
Password
PPP Authentication
VJ compression
IKE Authentication
Method
IPSec Security Method
Medium
Vigor2820 Series User's Guide
Build an IPSec VPN connection to the server through Internet.
Build a L2TP VPN connection through the Internet. You can select
to use L2TP alone or with IPSec. Select from below:
None: Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
This field is applicable when you select ISDN, PPTP or L2TP with
or without IPSec policy above.
This field is applicable when you select ISDN, PPTP or L2TP with
or without IPSec policy above.
This field is applicable when you select ISDN, PPTP or L2TP with
or without IPSec policy above. PAP/CHAP is the most common
selection due to wild compatibility.
This field is applicable when you select ISDN, PPTP or L2TP with
or without IPSec policy above. VJ Compression is used for TCP/IP
protocol header compression. Normally set to Yes to improve
bandwidth utilization.
This group of fields is applicable for IPSec Tunnels and L2TP with
IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) - Select one predefined Profiles set in
the VPN and Remote Access >>IPSec Peer Identity.
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Authentication Header (AH) means data will be authenticated,
but not be encrypted. By default, this option is active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm and
not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption algorithm
and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm and
not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
158

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigor2820nVigor2820vVigor2820vnVigor2820vsVigor2820vsn

Table of Contents