Page 101 / 146
Scroll up to view Page 96 - 100
Chapter 4: Configuration
97
Configuring PPTP VPN in the Head Office
The IP address 192.168.1.201 will be assigned to the router located in the branch office. Please make
sure this IP is not used in the head office LAN.
Item
Function
Description
1
Connection Name
HeadOffice
Given a name of PPTP connection
Dial in
Check Dial in
2
Private
IP
Address Assigned
to Dialing User
192.168.1.200
IP address assigned to branch office network
Peer Network IP
192.168.0.0
Branch office network
3
Netmask
255.255.255.0
Username
username
4
Password
123456
Input username & password to authenticate branch
office network
Auth.Type
Chap(Auto)
Data Encryption
Auto
Key Length
Auto
5
Mode
stateful
Keep as default value in most of the cases, PPTP
server & client will determine the value automatically.
Refer to manual for details if you want to change the
setting.
6
Idle Time
0
The connection will be disconnected when there Is no
traffic in a predefined period of time.
Idle time 0 means
the connection is always on.
1
4
3
2
5
6
Page 102 / 146
Chapter 4: Configuration
98
Configuring PPTP VPN in the Branch Office
The IP address 69.1.121.30 is the
Public IP
address of the router located in head office. If you
registered the DDNS (please refer to the
DDNS
section of this manual), you can also use the domain
name instead of the IP address to reach the router.
Item
Function
Description
1
Connection Name
BranchOffice
Given a name of PPTP connection
Dial out
Check Dial out
2
Server IP Address
(or Hostname)
69.121.1.33
IP address of the head office router (in WAN side)
Peer Network IP
192.168.1.0
3
Netmask
255.255.255.0
Head office network
Username
username
4
Password
123456
Input username & password to authenticate branch
office network
Auth.Type
Chap(Auto)
Data Encryption
Auto
Key Length
Auto
5
Mode
stateful
Keep as default value in most of the cases, PPTP
server & client will determine the value automatically.
Refer to manual for details if you want to change the
setting.
6
Idle Time
0
The connection will be disconnected when there Is no
traffic in a predefined period of time.
Idle time 0 means
the connection is always on.
1
4
3
2
5
6
Page 103 / 146
Chapter 4: Configuration
99
Example: Configuring a IPSec LAN-to-LAN VPN Connection
Table 3: Network Configuration and Security Plan
Branch Office
Head Office
Local Network ID
192.168.0.0/24
192.168.1.0/24
Local Router IP
69.1.121.30
69.1.121.3
Remote Network ID
192.168.1.0/24
192.168.0.0/24
Remote Router IP
69.1.121.3
69.1.121.30
IKE Pre-shared Key
12345678
12345678
VPN Connection Type
Tunnel mode
Tunnel mode
Security Algorithm
ESP:MD5 with AES
ESP:MD5 with AES
Both office LAN networks
MUST in different subnet
with LAN to LAN
application.
Functions of
Pre-shared Key, VPN Connection Type and Security Algorithm
MUST BE
identically set up on both sides.
Attention
Page 104 / 146
Chapter 4: Configuration
100
Configuring IPSec VPN in the Head Office
Item
Function
Description
1
Connection Name
IPSec_HeadOffice
Given a name of IPSec connection
Subnet
Check Subnet radio button
IP Address
192.168.1.0
2
Netmask
255.255.255.0
Head office network
3
Secure Gateway Address
(or Hostname)
69.121.1.30
IP address of the head office router (in
WAN side)
Subnet
Check Subnet radio button
IP Address
192.168.0.0
4
Netmask
255.255.255.0
Branch office network
ESP
Check ESP radio button
Authentication
MD5
Encryption
3DES
Prefer Forward Security
None
5
Pre-shared Key
12345678
Security plan
4
1
2
3
5
Page 105 / 146
Chapter 4: Configuration
101
Configuring IPSec VPN in the Branch Office
Item
Function
Description
1
Connection Name
IPSec_Branch
Office
Given a name of IPSec connection
Subnet
Check Subnet radio button
IP Address
192.168.0.0
2
Netmask
255.255.255.0
Branch office network
3
Secure Gateway Address
(or Hostname)
69.121.1.3
IP address of the head office router (in
WAN side)
Subnet
Check Subnet radio button
IP Address
192.168.1.0
4
Netmask
255.255.255.0
Head office network
ESP
Check ESP radio button
Authentication
MD5
Encryption
3DES
Prefer Forward Security
None
5
Pre-shared Key
12345678
Security plan
4
1
2
3
5