Operation Manual
Vigor2133 Series User’s Guide 
223
select, PPTP or L2TP with or without IPSec policy above. 
PAP/CHAP/MS-CHAP/MS-CHAPv2 is the most common 
selection due to compatibility. 
VJ compression - This field is applicable when you select 
PPTP or L2TP with or without IPsec policy above. VJ 
Compression is used for TCP/IP protocol header compression. 
Normally set to On to improve bandwidth utilization.   
IKE Authentication Method - This group of fields is 
applicable for IPsec Tunnels and L2TP with IPsec Policy. 
  Pre-Shared Key - Input 1-63 characters as pre-shared 
key. 
  Digital Signature (X.509) - Select one predefined 
Profiles set in the VPN and Remote Access >>IPsec 
Peer Identity. 
Peer ID - Select one of the predefined Profiles set in 
VPN and Remote Access >>IPsec Peer Identity. 
Local ID – Specify a local ID (Alternative Subject Name 
First or Subject Name First) to be used for Dial-in 
setting in the LAN-to-LAN Profile setup. This item is 
optional and can be used only in IKE aggressive mode. 
  Local Certificate – Select one of the profiles set in 
Certificate Management>>Local Certificate. 
IPsec Security Method - This group of fields is a must for 
IPsec Tunnels and L2TP with IPsec Policy. 
  Medium AH (Authentication Header) means data will 
be authenticated, but not be encrypted. By default, 
this option is active. 
  High (ESP-Encapsulating Security Payload)- means 
payload (data) will be encrypted and authenticated. 
Select from below: 
  DES without Authentication -Use DES encryption 
algorithm and not apply any authentication 
scheme. 
  DES with Authentication-Use DES encryption 
algorithm and apply MD5 or SHA-1 authentication 
algorithm. 
  3DES without Authentication-Use triple DES 
encryption algorithm and not apply any 
authentication scheme. 
  3DES with Authentication-Use triple DES 
encryption algorithm and apply MD5 or SHA-1 
authentication algorithm. 
  AES without Authentication-Use AES encryption 
algorithm and not apply any authentication 
scheme. 
  AES with Authentication-Use AES encryption 
algorithm and apply MD5 or SHA-1 authentication 
algor
i
thm. 
Advanced - Specify mode, proposal and key life of each IKE 
phase, Gateway, etc. 
The window of advance setup is shown as below: 










