Page 46 / 82 Scroll up to view Page 41 - 45
SafeStream
TM
Gigabit Broadband VPN Router User Guide
TL-R600VPN
40
Step 2:
Select the Mode and enter the Host Description and LAN IP Address.
Figure 4-32
Step 3:
Click the
Save
button.
Other configurations for the entries as shown in Figure 4-31:
Click the
Delete All
button to delete all the entries.
Click the
Previous
button to view the information in the previous screen,
click the
Next
button to
view the information in the next screen.
4.7.3
Target
Choose menu “
Access Control
Target
”, you can configure Target of the Access Control rule
in the next screen (shown in Figure 4-33).
Figure 4-33
¾
Target Description:
Displays the description of the target and the description is unique.
¾
Information:
Displays the IP address, port or domain name that the PCs can access or not.
To add/modify a target for Access Control Rule:
Step 1:
Click
Add New/Modify…
shown in Figure 4-33, you will see a new screen shown in
Figure 4-34
Step 2:
Select the Mode, Protocol, and Common Service Port and enter the Target Description,
IP Address and Target port.
Page 47 / 82
TL-R600VPN
SafeStream
Gigabit Broadband VPN Router User Guide
TM
41
Figure 4-34
Step 3:
Click the
Save
button.
Other configurations for the entries as shown in Figure 4-33:
Click the
Delete All
button to delete all the entries.
Click the
Previous
button to view the information in the previous screen,
click the
Next
button to
view the information in the next screen.
4.7.4
Schedule
Choose menu “
Access Control
Target
”, you can configure the effective time of the Access
Control rule in the next screen (shown in Figure 4-35).
Figure 4-35
¾
Schedule Description:
Displays the description of the schedule and the description is
unique.
¾
Day:
Displays the day on which the rule takes effect
¾
Time:
Displays the time between which the rule takes effect.
Page 48 / 82
SafeStream
TM
Gigabit Broadband VPN Router User Guide
TL-R600VPN
42
To add/modify a target for Access Control Rule:
Step 1:
Click
Add New…
/
Edit
shown in Figure 4-35, you will see a new screen shown in Figure
4-36.
Step 2:
Enter the Schedule Description and select the days, and then specify the Start Time and
Stop Time.
Figure 4-36
Step 3:
Click the
Save
button.
Other configurations for the entries as shown in Figure 4-35:
Click the
Delete All
button to delete all the entries.
Click the
Previous
button to view the information in the previous screen,
click the
Next
button to
view the information in the next screen.
4.8
IPsec VPN
Choose menu “
IPsec VPN
”, the next submenus are shown below.
Figure 4-37
Click any of them, and you will be able to configure the corresponding function. The detailed
explanations for each submenu are provided below.
4.8.1
IKE
Choose menu “
IPsec VPN
IKE
”, you can configure the related parameters for IKE negotiation
and view the IKE policy in the next screen (shown in Figure 4-38).
Page 49 / 82
TL-R600VPN
SafeStream
Gigabit Broadband VPN Router User Guide
TM
43
Figure 4-38
¾
Policy Name:
The unique name to the IKE policy for identification and management
purposes.
¾
Exchange Mode:
Displays the IKE Exchange Mode in phase 1, and the remote VPN peer
uses the same mode.
z
Main: Main mode provides identity protection and exchanges more information,
which applies to the scenarios with higher requirement for identity protection.
z
Aggressive: Aggressive Mode establishes a faster connection but with lower
security, which applies to scenarios with lower requirement for identity protection.
¾
Authentication:
The authentication algorithm for IKE negotiation. Options include:
z
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and
generates a 128-bit message digest.
z
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th
power of 2) in bits and generates a 160-bit message digest.
¾
Encryption:
The encryption algorithm for IKE negotiation. Options include:
z
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a
56-bit key.
z
3DES: Triple DES, encrypts a plain text with 168-bit key.
z
AES128: Uses the AES algorithm and 128-bit key for encryption.
z
AES192: Uses the AES algorithm and 192-bit key for encryption.
z
AES256: Uses the AES algorithm and 256-bit key for encryption.
¾
DH Group:
The DH (Diffie-Hellman) group to be used in key negotiation phase 1. The DH
Group sets the strength of the algorithm in bits. Options include DH1, DH2 and DH5.
z
DH1: 768 bits
z
DH2: 1024 bits
Page 50 / 82
SafeStream
TM
Gigabit Broadband VPN Router User Guide
TL-R600VPN
44
z
DH3: 1536 bits
¾
Pre-shared Key:
The Pre-shared Key for IKE authentication, and ensure both the two peers
use the same key. The key should consist of visible characters without blank space.
To add/modify an IKE entry:
Step 1:
Click
Add New…/Modify
shown in Figure 4-38, you will see a new screen shown in
Figure 4-39.
Step 2:
Enter the Policy Name, Pre-Shared Key, SA Lifetime and then select the Exchange
Mode, Authentication Algorithm, Encryption Algorithm, DH Group. Then enable or
disable the DPD.
Figure 4-39
Step 3:
Click the
Save
button.
Other configurations for the entries as shown in Figure 4-38:
Click the
Delete All
button to delete all the entries.
Click the
Previous
button to view the information in the previous screen,
click the
Next
button to
view the information in the next screen.
4.8.2
IPsec
Choose menu “
IPsec VPN
IPsec
”, you can configure the related parameters for IPsec
negotiation and view the IPsec policy in the next screen (shown in Figure 4-40).

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top