Page 91 / 130 Scroll up to view Page 86 - 90
Billion 810VGTX Router
Page | 90
Example: Configuring a Remote Access L2TP VPN Dial-out Connection
A company’s office establishes a L2TP VPN connection with a file server located at a separate location. The router is
installed in the office, connected to a couple of PCs and Servers.
Configuring L2TP VPN in the Office
The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used in the
Office LAN.
Page 92 / 130
Billion 810VGTX Router
Page | 91
Function
Description
Name
VPN_L2TP
Give a name of L2TP Connection
Connection Type
Remote Access
Select Remote Access from the Connection Type
drop-down menu
Type
Dial Out
Select Dial out from the Type drop down menu
IP Address (or
Hostname)
69.121.1.33
A Dialed Server IP
Username
username
An assigned username and password
Password
123456
Auth. Type
Chap (Auto)
Keep this as the default value for most cases
IPSec
Enable
Enable this to enhance your L2TP VPN security
Authentication
MD5
Both sides should use the same value
Encryption
3DES
Prefer Forward
Security
None
Pre-Shared Key
12345678
Example: Configuring your Router to Dial-in to the Server
Currently, Microsoft Windows operating systems do not support L2TP incoming services. Additional software may be
required to set up your L2TP incoming service.
L2TP Connection - LAN to LAN
L2TP VPN Connection
Name:
A given name for the connection
Connection Type:
Remote Access or LAN to LAN.
Type:
Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office
server), check Dial In to have it operate as a VPN server.
When configuring your router to establish a connection to a remote LAN, enter the remote Server IP Address
(or Hostname) you wish to connect to.
When configuring your router as a server to accept incoming connections, enter the Private IP Address assigned to
the Dial in User.
IP Address:
Enter the IP address.
Peer Network IP:
Enter Peer network IP address.
Netmask:
Enter the subnet mask of peer network based on the Peer Network IP setting.
Page 93 / 130
Billion 810VGTX Router
Page | 92
Username:
If you are a Dial-Out user (client), enter the username provided to you by your Host. If you are a Dial-In user
(server), enter your own username.
Password:
If you are a Dial-Out user (client), enter the password provided to you by your Host. If you are a Dial-In user
(server), enter your own password.
Authentication Type:
Default is Auto if you want the router to determine the authentication type to use, or else manually
specify CHAP (Challenge Handshake Authentication Protocol) or PAP (Password Authentication Protocol) if you know
which type the server is using (when acting as a client), or else the authentication type you want clients connecting to
you to use (when acting as a server). When using PAP, the password is sent unencrypted, whilst CHAP encrypts the
password before sending, and also allows for challenges at different periods to ensure that the client has not been
replaced by an intruder.
Tunnel Authentication:
This enables the router to authenticate both the L2TP remote and L2TP host systems. This is
only valid when L2TP the remote system supports this feature.
Secret:
The secure password length should be 16 characters which may include numbers and characters.
Active as default route:
Commonly used by the Dial-out connection. All packets will route through the VPN tunnel to the
Internet; therefore, activating the function may degrade Internet performance.
Remote Host Name (Optional
Enter the hostname of the remote VPN device. It is a tunnel identifier to check if the
Remote VPN device matches with the Remote hostname provided. If the remote hostnames match, the tunnel will be
connected; otherwise, it will be dropped.
Caution: This only applies when the router is acting as a VPN server. This option should be used by advanced
users only.
Local Host
Name (Optional): Enter hostname of Local VPN device that is connected / established a VPN tunnel. By
default, the router’s default hostname is
home.gateway
.
IPSec:
Enable to enhance your L2TP VPN security.
Authentication:
Authentication establishes the integrity of the datagram and ensures that it is not tampered with during
transmission. There are three options, Message Digest 5 (MD5), Secure Hash Algorithm (SHA1) or NONE. SHA1 is
more resistant to brute-force attacks than MD5, however it is slower.
MD5:
A one-way hashing algorithm that produces a 128-bit hash.
SHA1:
A one-way hashing algorithm that produces a 160-bit hash.
Encryption:
Select the encryption method from the pull-down menu. There are four options, DES, 3DES, AES and
NULL. NULL means that it is a tunnel with no encryption. 3DES and AES are more powerful but increase latency.
DES:
Stands for Data Encryption Standard, it uses 56 bits as an encryption method.
3DES:
Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption method.
AES:
Stands for Advanced Encryption Standards, it uses 128 bits as an encryption method.
Perfect Forward Secrecy:
Choose whether to enable PFS using Diffie-Hellman public-key cryptography to change
encryption keys during the second phase of VPN negotiation. This function will provide better security, but extends the
VPN negotiation time. Diffie-Hellman is a public-key cryptography protocol that allows two parties to establish a shared
secret over an unsecured communication channel (i.e. over the Internet). There are three modes, MODP 768-bit, MODP
1024-bit and MODP 1536-bit. MODP stands for Modular Exponentiation Groups.
Pre-shared Key:
This is for the Internet Key Exchange (IKE) protocol, a string from 4 to 128 characters. Both sides
should use the same key. IKE is used to establish a shared security policy and authenticated keys for services (such as
IPSec) that require a key. Before any IPSec traffic can be passed, each router must be able to verify the identity of its
peer. This can be done by manually entering the pre-shared key into both sides (router or hosts).
Page 94 / 130
Billion 810VGTX Router
Page | 93
°
Both office Networks MUST be in different subnets with the LAN-LAN
application.
°
Functions of Pre –shared keys, VPN Connection Type and Security
Algorithms must be identical on both sides.
Click Edit/Delete to save your changes.
Example: Configuring L2TP LAN-to-LAN VPN Connection
The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The
routers are installed in the head office and branch office accordingly.
Attention
Configuring L2TP VPN in the Head Office
The IP address 192.168.1.200 will be assigned to the router located in the branch office. Please make sure this IP is not
used in the head office LAN.
Page 95 / 130
Billion 810VGTX Router
Page | 94
Function
Description
Name
Head Office
Give a name to the L2TP Connection
Connection Type
LAN to LAN
Select LAN to LAN from the Connection Type drop-down
menu
Type
Dial in
Select Dial in from the Type drop down menu
IP Address
192.168.1.200
IP address assigned to the branch office network
Peer Network IP
192.168.0.0
Branch office network
Username
username
A username and password assigned to
authenticate the branch office network
Password
123456
Auth. Type
Chap (Auto)
Keep this as the default value in most cases
IPSec
Enable
Enable this to enhance your L2TP VPN security
Authentication
MD5
Both sides should use the same value
Encryption
3DES
Prefer Forward
Security
None
Pre-Shared Key
12345678

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top