User`s manual
• If the Public Network dialog box appears, choose the appropriate initial connection and click Next.
• In the VPN Server Selection dialog, enter the external IP address or hostname of the DFL-500 to connect
to and click Next.
• Click Finish.
Configuring the VPN connection
• Right click the icon that you have created.
• Select Properties > Security .
• Click Typical to configure typical settings.
• Click to select Require data encryption.
• Click Advanced to configure advanced settings.
• Click Settings.
• Click to select Challenge Handshake Authentication Protocol (CHAP).
• Make sure none of the other settings are selected.
• Click the Networking tab.
• Make sure the following are selected:
o TCP/IP
o QoS Packet Scheduler
• Make sure the following options are not selected:
o File and Printer Sharing for Microsoft Networks
o Client for Microsoft Networks
Disabling IPsec
• Click the Networking tab.
• Click Internet Protocol (TCP/IP) properties.
• Double-click the Advanced tab.
• Go to the Options tab and click IP security properties.
• Make sure Do not use IPSEC is checked.
• Click OK and close the connection properties window.
The default Windows XP L2TP traffic policy does not allow L2TP traffic without IPSec encryption. You can
disable default behavior by editing the Windows XP Registry as described in the following steps. Please refer
to the Microsoft documentation for editing the Windows Registry.
• Use the registry editor (regedit) to locate the following key in the registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rasman\Parameters
• Add the following registry value to this key:
Value Name: ProhibitIpSec
Data Type: REG_DWORD
Value: 1
• Save your changes and restart the computer for the changes to take effect.
You must add the ProhibitIpSec registry value to each Windows XP-based endpoint computer of an
L2TP or IPSec connection to prevent the automatic filter for L2TP and IPSec traffic from being created.
When the ProhibitIpSec registry value is set to 1, your Windows XP-based computer does not create
the automatic filter that uses CA authentication. Instead, it checks for a local or Active Directory IPSec
policy.
DFL-500 User’s Manual
65