User's Manual
Table Of Contents
- 1 Introduction and Scope
- Glossary
- 2 Product Features
- 3 Pepwave MAX Mobile Router Overview
- 4 Advanced Feature Summary
- 5 Installation
- 6 Mounting the Unit
- 7 Connecting to the Web Admin Interface
- 8 Configuring the LAN Interface(s)
- 9 Configuring the WAN Interface(s)
- 10 Advanced Wi-Fi Settings
- 11 ContentHub Configuration
- 12 MediaFast Configuration
- 13 Bandwidth Bonding SpeedFusionTM / PepVPN
- 14 IPsec VPN
- 15 Outbound Policy Management
- 16 Inbound Access
- 17 NAT Mappings
- 18 QoS
- 19 Firewall
- 22 Remote User Access
- 23 Miscellaneous Settings
- 24 AP - access point
- 26 AP Controller Status
- 27 Toolbox
- 28 System Settings
- 29 Tools
- 30 Status
- Appendix A: Restoration of Factory Defaults
- Appendix B: Declaration
https://www.peplink.com
Copyright @ 2021 Pepwave
Pre-shared Key
This defines the peer authentication pre-
shared key used to authenticate this VPN
connection. The connection will be up only if the pre-
shared keys on each side
match.
Remote
Certificate (pem
encoded)
Available only when X.509 Certificate is chosen as the Authentication
method,
this field allows you to paste a valid X.509 certificate.
Local ID
In Main Mode, this field can be left blank. In Aggressive Mode, if
Remote
Gateway IP Address
is filled on this end and the peer end, this field can be left
blank. Otherwise, this field is typically a U-FQDN.
Remote ID
In Main Mode, this field can be left blank. In Aggressive Mode, if
Remote
Gateway IP Address
is filled on this end and the peer end, this field can be left
blank. Otherwise, this field is typically a U-FQDN.
Phase 1 (IKE)
Proposal
In Main Mode
, this allows setting up to six encryption standards, in descending
order of priority, to be used in initial connection key negotiations. In
Aggressive
Mode, only one selection is permitted.
Phase 1 DH
Group
This is the Diffie-
Hellman group used within IKE. This allows two parties to
establish a shared secret over an insecure communications channel. The larger
the group number, the higher the security.
Group 2: 1024-bit is the default value.
Group 5: 1536-bit is the alternative option.
Phase 1 SA
Lifetime
This setting specifies the lifetime limit of this Phase 1 Security Association. By
default, it is set at 3600 seconds.
Phase 2 (ESP)
Proposal
In Main Mode, this allo
ws setting up to six encryption standards, in descending
order of priority, to be used for the IP data that is being transferred. In
Aggressive
Mode, only one selection is permitted.
Phase 2 PFS
Group
Perfect forward secrecy (PFS) ensures that if a key wa
s compromised, the
attacker will be able to access only the data protected by that key.
None -
Do not request for PFS when initiating connection. However, since there
is no valid reason to refuse PFS, the system will allow the connection to use PFS
if requested by the remote peer. This is the default value.
Group 2: 1024-bit Diffie-
Hellman group. The larger the group number, the higher
the security.
Group 5: 1536-bit is the third option.
Phase 2 SA
Lifetime
This setting specifies the lifetime limit of this Phase 2 Security Association. By
default, it is set at 28800 seconds.