Netgear DGND4000 User Manual Page 135

  • Download
  • Add to my manuals
  • Print
  • Page
    / 160
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 134
Advanced Settings
135
N750 Wireless Dual Band Gigabit ADSL Modem Router DGND4000
- Initiator and Responder. Both incoming and outgoing connections are allowed.
- Exchan
ge Mode. Currently, only Main Mode is supported. Ensure that the remote
VPN endpoint is set to use Main Mode.
- Diffie-Hellm
an (DH) Group. The Diffie-Hellman algorithm is used when the
connection exchanges keys. The DH Group setting determines the bit size used
in the exchange. This value must match the value used on the remote VPN
gateway.
- Local Identi
ty Type. Select the desired option to match the Remote Identity Type
setting on the remote VPN endpoint.
- W
AN IP Address. Your Internet IP address.
- Fully
Qualified Domain Name. Your domain name.
- Fully
Qualified User Name. Your name, email address, or other ID.
- Loca
l Identity Data. Enter the data for the selection. (If WAN IP Address is
selected, no input is required.)
- Remote Id
entity Type. Select the desired option to match the Local Identity Type
setting on the remote VPN endpoint.
- IP Address.
The Internet IP address of the remote VPN endpoint.
- Fully
Qualified Domain Name. The domain name of the remote VPN endpoint.
- Fully Qu
alified User Name. The name, email address, or other ID of the remote
VPN endpoint.
- Re
mote Identity Data. Enter the data for the selection. (If IP Address is selected,
no input is required.)
Parameters.
- Encryption
Algorithm. The encryption algorithm used for both IKE and IPSec.
This setting has to match the setting used on the remote VPN gateway.
- Authentic
ation Algorithm. The authentication algorithm used for both IKE and
IPSec. This setting must match the setting used on the remote VPN gateway.
- Pre-shared Key. Th
e key has to be entered both here and on the remote VPN
gateway.
- SA Life T
ime. This setting determines the time interval before the SA (security
association) expires. (It is automatically reestablished as required.) While using a
short time period (or data amount) increases security, it also degrades
performance. It is common to use periods over an hour (3600 seconds) for the SA
lifetime. This setting applies to both IKE and IPSec SAs.
- Enable
PFS (Perfect Forward Secrecy). If enabled, security is enhanced by
ensuring that the key is changed at regular intervals. Also, even if one key is
broken, subsequent keys are no easier to break. (Each key has no relationship to
the previous key.)
This setting applies to both IKE and IPSec SAs. When configuring the remote
e
ndpoint to match this setting, you might have to specify the key group used. For
this device, the key group is the same as the DH Group setting in the IKE section.
3. Click App
ly when done.
Page view 134
1 2 ... 130 131 132 133 134 135 136 137 138 139 140 ... 159 160

Comments to this Manuals

No comments