Page 141 / 304 Scroll up to view Page 136 - 140
VigorPro5300 Series User’s Guide
133
Profile Name
Type in a name in this file.
Accept Any Peer ID
Click to accept any peer regardless of its identity.
Accept Subject Alternative
Name
Click to check one specific field of digital signature to accept
the peer with matching value. The field can be
IP Address,
Domain,
or
E-mail
address. The box under the Type will
appear according to the type you select and ask you to fill in
corresponding setting.
Accept Subject Name
Click to check the specific fields of digital signature to accept
the peer with matching value. The field includes
Country (C),
State (ST), Location (L), Organization (O), Organization
Unit (OU), Common Name (CN),
and
Email (E)
.
Page 142 / 304
VigorPro5300 Series User’s Guide
134
3.10.5 Remote Dial-in User
You can manage remote access by maintaining a table of remote user profile, so that users
can be authenticated to dial-in via ISDN or build the VPN connection. You may set
parameters including specified connection peer ID, connection type (VPN connection -
including PPTP, IPSec Tunnel, and L2TP by itself or over IPSec) and corresponding security
methods, etc.
The router provides
100
access accounts for dial-in users. Besides, you can extend the user
accounts to the RADIUS server through the built-in RADIUS client function. The following
figure shows the summary table.
Set to Factory Default
Click to clear all indexes.
Index
Click the number below Index to access into the setting page
of Remote Dial-in User.
User
Display the username for the specific dial-in user of the
LAN-to-LAN profile. The symbol
???
represents that the
profile is empty.
Status
Display the access state of the specific dial-in user.
The
symbol V and X represent the specific dial-in user to be active
and inactive, respectively.
Click each index to edit one remote user profile.
Each Dial-In Type requires you to fill the
different corresponding fields on the right.
If the fields gray out, it means you may leave it
untouched. The following explanation will guide you to fill all the necessary fields.
Page 143 / 304
VigorPro5300 Series User’s Guide
135
Enable this account
Check the box to enable this function.
Idle Timeout-
If the dial-in user is idle over the limitation of
the timer, the router will drop this connection. By default, the
Idle Timeout is set to 300 seconds.
ISDN
Allow the remote ISDN dial-in connection. You can further
set up Callback function below. You should set the User
Name and Password of remote dial-in user below. This feature
is for
i
model only.
PPTP
Allow the remote dial-in user to make a PPTP VPN
connection through the Internet. You should set the User
Name and Password of remote dial-in user below
IPSec Tunnel
Allow the remote dial-in user to make an IPSec VPN
connection through Internet.
L2TP
Allow the remote dial-in user to make a L2TP VPN
connection through the Internet. You can select to use L2TP
alone or with IPSec. Select from below:
None -
Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have -
Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-in VPN connection
becomes one pure L2TP connection.
Must -
Specify the IPSec policy to be definitely applied on the
L2TP connection.
Page 144 / 304
VigorPro5300 Series User’s Guide
136
SSL Tunnel
It allows the remote dial-in user to make an SSL VPN
Tunnel connection through Internet, suitable for the
application through network accessing (e.g.,
PPTP/L2TP/IPSec)
If you check this box, the function of SSL Tunnel for this
account will be activated immediately.
To check if SSL Tunnel is activated or not, please open
Draytek SSL VPN portal interface. From the web page, you
will see the message to indicate the SSL Tunnel is activated.
Specify Remote Node
Check the checkbox-
You can specify the IP address of the
remote dial-in user, ISDN number or peer ID (used in IKE
aggressive mode).
Uncheck the checkbox-
This means the connection type you
select above will apply the authentication methods and
security methods in the
general settings
.
Netbios Naming Packet
Pass
– click it to have an inquiry for data transmission
between the hosts located on both sides of VPN Tunnel while
connecting.
Block
– When there is conflict occurred between the hosts on
both sides of VPN Tunnel in connecting, such function can
block data transmission of Netbios Naming Packet inside the
tunnel.
SSL VPN
It allows the remote dial-in user to access internal web over
SSL VPN, suitable for the application through web only (e.g.,
HTTP). Click
Set SSL Web Proxy
to set profiles.
If you have set several profiles beforehand, you can check
SSL Web Proxy and choose the one(s) you need as SSL VPN.
Page 145 / 304
VigorPro5300 Series User’s Guide
137
To check if SSL Web Proxy is activated or not, please open
Draytek SSL VPN portal interface. From the web page, you
will see the message to indicate that you have the privilege for
the SSL Web Proxy.
Set SSL Web Proxy
– If you haven’t set any SSL VPN web
proxy profiles, you will a link here. Click this link to access
into the configuration page of SSL VPN.
Note:
SSL VPN can be applied in browser (e.g., IE)
which supports ActivateX only.
User Name
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
Password
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
IKE Authentication Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy when you specify the IP address of the
remote node. The only exception is Digital Signature (X.509)
can be set when you select IPSec tunnel either with or without
specify the IP address of the remote node.
Pre-Shared Key -
Check the box of Pre-Shared Key to
invoke this function and type in the required characters (1-63)
as the pre-shared key.
Digital Signature (X.509) –
Check the box of Digital
Signature to invoke this function and Select one predefined
Profiles set in the
VPN and
Remote Access >>IPSec Peer
Identity.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy when you specify the remote node. Check
the Medium, DES, 3DES or AES box as the security method.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top