Page 71 / 83 Scroll up to view Page 66 - 70
B
10 • VPN Pages
61
Field
Description
Remote Endpoint Settings
Address group type
Set the remote VPN access group to one of the following
group types:
Single IP address
— for one computer, enter the IP address
for the specific computer
IP address range
— for a small range of computers, enter the
starting and ending IP addresses for the group of consecutive
IP addresses to have access to the VPN tunnel.
IP Subnet
— for an entire subnet/network, enter the Subnet
and Mask
For IP address range and IP Subnet, enter the starting and
ending IP addresses for the group of consecutive IP addresses
to have access to the VPN tunnel.
The remote VPN endpoint on the other side of the tunnel
should match these settings for its local endpoint settings.
Identity type
Define the remote endpoint identity type to automatically use
the remote endpoint IP address, or as a user-specified IP
address, fully qualified domain name (FQDN), or e-mail
address. This is the identity that the far endpoint uses for
identification of the VPN termination point and handshake.
The remote VPN endpoint on the other side of the tunnel
should match these settings for its local endpoint settings.
Identity
Enter the identity string:
For IP address, enter
x.x.x.x
.
For FQDN, enter
yourdomain.com
For email address identity, enter
The remote VPN endpoint on the other side of the tunnel
should match the settings here for its local endpoint settings.
Network address type
Select the remote endpoint’s WAN address type: IP address or
Fully Qualified Domain Name (FQDN)
Remote Address
Enter either the IP address of the remote endpoint or its
FQDN.
IPsec Settings
Associate one of the two phases of Security Association (SA)
to the VPN tunnel. Phase 1 creates an IKE SA. After Phase 1 is
completed, Phase 2 creates one or more IPSEC SAs, which are
then used to key IPSEC sessions.
Pre-shared key
Enter the “Pre-shared Key” field if one side of the VPN tunnel
is using a unique firewall identifier (or Pre-shared Key.
Page 72 / 83
B
10 • VPN Pages
62
Field
Description
Phase 1 DH group
Select one of the Diffie-Hellman groups: 768 bits, 1024 bits, or
1536 bits.
Diffie-Hellman is a cryptographic technique that uses public
and private keys for encryption and decryption. The higher the
number of bits, the more secure the encryption. Options:
Group 1 (768 bits), Group 2 (1024 bits), or Group 5 (1536 bits).
Phase 1 encryption
Secure the VPN connection between endpoints: DES, 3DES,
AES-128, AES-192, or AES-256.
Select any encryption but make the far endpoints match.
Common encryption settings are 3DES and AES.
Phase 1 authentication
Set Authentication, another level of security, to SHA or MD5
Motorola recommends SHA because it is more secure but you
can use either authentication provided the other end of the
VPN tunnel uses the same method.
Phase 1 SA lifetime
Specify the lifetime of individual rotating keys.
Enter the number of seconds for the key to last until a re-key
negotiation between each endpoint is negotiated. The default
setting is 28,800 seconds.
A smaller lifetime is generally more secure, since it would give
an attacker a smaller amount of time to try to crack the key,
however key negotiation takes up bandwidth, so network
throughput is sacrificed with small lifetimes. Entries are
typically in the thousands or tens of thousands of seconds.
Page 73 / 83
B
10 • VPN Pages
63
VPN L2TP/PPTP Page
Configure L2TP and PPTP server options.
Field
Description
PPP Address Range
Start
End
Specify the starting and ending IP address range so that when
the tunnel is set up, the client and server side get their IP
address from this specified range.
PPP Security
MPPE Encryption
Enable or disable Microsoft Point to Point Encryption (MPPE).
is
a type of link encryption, meaning that data sent along this tunnel
is encrypted, used in PPTP.
Username
Authenticates the tunnel that was created between the client and
the server
Password
Enter a user password for authentication.
Confirm Password
Enter the password again for confirmation.
Preshared Phrase
Authenticates the Layer 2 Tunneling Protocol (L2TP) server.
Page 74 / 83
B
10 • VPN Pages
64
VPN Event Log Page
View the VPN Event Log, which shows a history of VPN connections and activity in
chronological order and the IP address of remote and local endpoints on the tunnel.
Click
Refresh
to update the Event Log table to show any changes since the web
page was last loaded.
Click
Clear
to clear the log table of its current contents. Only the most recent data
appears.
Page 75 / 83
B
11 • MTA Pages
65
11
MTA Pages
Use the Internet to make telephone calls. The Multimedia Terminal Adapter (MTA)
supports basic telephone functions, such as three-way calling, voice mail, and fax
transmissions.
MTA Status Page
Displays the initialization status of the MTA.
MTA DHCP Page
Displays the MTA DHCP lease information.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top