User`s guide
Vigor2820 Series User’s Guide
149
PPTP Build a PPTP VPN connection to the server through the Internet.
You should set the identity like User Name and Password
below for the authentication of remote server.
IPSec Tunnel Build an IPSec VPN connection to the server through Internet.
L2TP with … Build a L2TP VPN connection through the Internet. You can
select to use L2TP alone or with IPSec. Select from below:
None: Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-out VPN connection
becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on the
L2TP connection.
User Name This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
Password This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
PPP Authentication This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above. PAP/CHAP is the most
common selection due to wild compatibility.
VJ compression This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above. VJ Compression is used for
TCP/IP protocol header compression. Normally set to Yes to
improve bandwidth utilization.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy.
Pre-Shared Key - Input 1-63 characters as pre-shared key.
Digital Signature (X.509) - Select one predefined Profiles set
in the VPN and Remote Access >>IPSec Peer Identity.
IPSec Security Method This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Medium Authentication Header (AH) means data will be authenticated,
but not be encrypted. By default, this option is active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.