1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 5360
  8. /
  9. 22
Page 106 / 126 Scroll up to view Page 101 - 105
Media
The Media page allows you to change some settings that can impact performance in
certain situations
To access the
Media
page:
3
Click
Wireless
in the menu bar.
4
Then click the
Media
submenu.
Figure 37. Example of Media Page shows an example of the menu and Table 32.
Media
Options
describes the items you can select.
Figure 37. Example of Media Page
Table 32. Media Options
Option
Description
Band Steering
Not applicable to this product
Airtime
If a 802.11g or 802.11b, client connects to the Cable Modem/Router
106
Page 107 / 126
Fairness
enabling Airtime Fairness will prevent the lower speed clients from
slowing down the router. If no slower clients connect than leave this
setting disabled.
Traffic
Scheduler
When wireless network is congested the traffic scheduler will
control access to the wireless queue when it reaches over capacity.
Exhausted
Buffer Order
Scheduling
(EBOS)
This setting is only enabled when the traffic scheduler is enabled.
EBOS will allow the first service link priority in sending traffic.
107
Page 108 / 126
14
VPN (Virtual Private Network) Menu Options
The VPN Menu lets you:
Configure a VPN tunnel
View VPN event logs
Basic Setting
This page allows you to enable VPN protocols and manage VPN tunnels. A virtual
private network (VPN) is a computer network in which some of the links between nodes
are carried by open connections or virtual circuits within some larger network (e.g., the
Internet) as opposed to by physical wires, as in a traditional private network. A VPN can
be used to separate the traffic of different user communities over an underlying network
with strong security features.
To access the
Basic
page:
1
Click
VPN
in the menu bar.
2
Then click the
Basic
submenu.
Figure 38 shows an example of the menu and Table 30 describes the items you can
select.
108
Page 109 / 126
Figure 38. Example of Basic Page
Table 33. Basic Menu Option
Option
Description
L2TP Server
Select Enable to enable L2TP (Layer 2 Tunneling Protocol) server.
PPTP Server
Select Enable to enable PPTP (Point-to-Point Tunneling Protocol)
server.
Configure
Select
Configure
to set up L2TP or PPTP.
IPSec Endpoint
Select Enable to enable IPSec endpoint.
IPSec
The IPSec page allows you to configure IPSec tunnel and endpoint settings. A VPN
tunnel is usually established in two phases. Each phase establishes a security
association (SA), a contract indicating what security parameters Cable Modem/Router
and the remote IPSec Cable Modem/Router will use.
The
first phase
establishes an Internet Key Exchange (IKE) SA between the
Cable Modem/Router and the remote IPSec Cable Modem/Router.
The
second phase
uses the IKE SA to securely establish an IPSec SA through
which the Cable Modem/Router and remote IPSec Cable Modem/Router can
send data between computers on the local network and remote network.
Before IPSec VPN configuration, try to familiarize yourself with terms like IPSec
Algorithms, Authentication Header and ESP protocol.
109
Page 110 / 126
IPSec Algorithms
The ESP and AH protocols are necessary to create a Security Association (SA), the
foundation of an IPSec VPN. An SA is built from the authentication provided by the AH
and ESP protocols. The primary function of key management is to establish and maintain
the SA between systems. Once the SA is established, the transport of data may
commence.
AH (Authentication Header) Protocol
The AH protocol (RFC 2402) was designed for integrity, authentication, sequence
integrity (replay resistance), and non-repudiation but not for confidentiality, for which the
ESP was designed.
In applications where confidentiality is not required or not sanctioned by government
encryption restrictions, an AH can be employed to ensure integrity. This type of
implementation does not protect the information from dissemination but will allow for
verification of the integrity of the information and authentication of the originator.
ESP (Encapsulating Security Payload) Protocol
The ESP protocol (RFC 2406) provides encryption as well as the services offered by AH.
ESP authenticating properties are limited compared to the AH due to the non-inclusion of
the IP header information during the authentication process. However, ESP is sufficient if
only the upper layer protocols need to be authenticated. An added feature of the ESP is
payload padding, which further protects communications by concealing the size of the
packet being transmitted.
To access the
IPSec
page:
1
Click
VPN
in the menu bar.
2
Then click the
IPSec
submenu.
Figure 39 shows an example of the menu and Table 31 describes the items you can
select.
110

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top