Vigor2900 Series User’s Guide
95
IKE Pre-Shared Key
Check the box of Pre-Shared Key to invoke this function and
type in the required characters (1-63) as the pre-shared key.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy when you specify the remote node. Check the
Medium, DES, 3DES or AES box as the security method.
Medium -Authentication Header (AH)
means data will be
authenticated, but not be encrypted. By default, this option is
invoked. You can uncheck it to disable it.
High-Encapsulating Security Payload (ESP)
means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
Local ID -
Specify a local ID to be used for Dial-in setting in
the LAN-to-LAN Profile setup. This item is optional and can be
used only in IKE aggressive mode.
Callback Function
The callback function provides a callback service only for the
ISDN dial-in user (for
i
model only). The router owner will be
charged the connection fee by the telecom.
Check to enable Callback function
-Enables the callback
function.
Specify the callback number
-The option is for extra security.
Once enabled, the router will ONLY call back to the specified
Callback Number.
Check to enable callback budget control
-By default, the
callback function has a time restriction. Once the callback
budget has been exhausted, the callback mechanism will be
disabled automatically.
Callback Budget (Unit: minutes)
- Specify the time budget for
the dial-in user. The budget will be decreased automatically per
callback connection.
3.8.5 LAN to LAN Profile Setup
Here you can manage LAN-to-LAN connections by maintaining a table of connection profiles.
You may set parameters including specified connection direction (dial-in or dial-out),
connection peer ID, connection type (VPN including PPTP, IPSec Tunnel, and L2TP by itself
or over IPSec) and corresponding security methods, etc.
The router provides up to 32 profiles, which also means supporting 32 VPN tunnels
simultaneously. The following figure shows the summary table.