Cisco WRV200 User Guide - Page 29

VPN > VPN Summary, and Start/Stop/Detail Connection. Each field displays - default password

Page 29 highlights

Chapter 5 Configuring the Wireless-G Router DPD will issue DPD packets (ISAKMP format) to query a remote peer, and wait for a reply to recognize that it is still alive. There are 3 auxiliary options: Detection Delay(s), Detection Timeout(s), and DPD Action for DPD. Detection Delay(s) You can indicate the interval between DPD query packets. The default value is 30 seconds. Detection Timeout(s) You can indicate the length of timeout when DPD cannot hear any DPD reply. The default value is 120 seconds. DPD Action When DPDTimeout expires, the DPD will take DPD Action to deal with the connection. You can select Wait for Response to still wait for remote peer response, or select Suspend Connection to stop passively recovering the connection or select Recover Connection. If IKE failed more than _times, block this unauthorized IP for _ seconds This feature is enabled by default. It enables the Router to block unauthorized IP addresses. Specify the number of times IKE must fail before the Router blocks that unauthorized IP address. Anti-replay This protects the Router from anti-replay attacks, when people try to capture your authentication packets in an attempt to gain access. The feature is enabled by default. When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More. VPN > VPN Summary VPN > VPN Summary This page summarizes the comprehensive details of IPSec VPN Tunnels that include Tunnel Name, Remote Gateway, Remote Group, Local Group, Key Methods, Tunnel Status, and Start/Stop/Detail Connection. Each field displays information according to a pre-configured value of IPSec tunnel separately, and each IPSec tunnel can be easily Wireless-G VPN Router with RangeBooster commanded to start/stop connection here. VPN Summary can help an administrator to manage and examine all IPSec tunnels status. Tunnel Name The field displays the name of the tunnel. Remote Gateway The field displays the remote gateway. If the pre-configured type is IP Addr., the field displays the IP address of remote gateway. If the pre-configured type of remote gateway is Any, the field displays ANY. If the pre-configured type is FQDN, the field displays the FQDN string directly. Remote Group The field displays the remote peer that is designated for VPN communication after a IPSec VPN tunnel is established. If the pre-configured type of the remote group is IP Addr., the field displays the IP address of the remote peer. If the pre-configured type of the remote group is Subnet, the field displays the subnet type "IP Address/Mask". If the pre-configured type of remote group is Host or Any, the field displays the "Host" or "Any" directly. Local Group The field displays the local peer that is designated for VPN communication after an IPSec VPN tunnel is established. If the pre-configured type of local group is IP Addr., the field displays the IP address of the local peer. If the pre-configured type of local group is Subnet, the field displays the subnet type "IP Address/ Mask". If the pre-configured type of local group is Host, the field displays the "Host" directly. Key Methods The field displays the IPSec authentication and encryption key methods of the Key exchange Method that is followed with the setting value of the Password Forward Secrecy. Tunnel Status The field displays the status of IPSec Tunnel as follows. • C The Tunnel is Connected. • T Try to Connect to Remote Peer. • Stop The Tunnel is Stopped. • D The Tunnel is Disabled. • Any The Tunnel always waits for the connection from the remote initiator. • NAT-T The Tunnel enables the NAT-Traversal to allow the remote initiator that is behind the NAT to construct this IPSec Tunnel. Start/Stop/Restart Connection You can manually start/ stop IPSec connection according to pre-configured tunnel settings. If the pre-configured type of remote gateway or remote group is either Any or NAT-Traversal, the Detail button can also examine Remote Security Gateway information. 24

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

Chapter µ
Configuring the Wireless-G Router
²´
Wireless-G VPN Router with RangeBooster
DPD will issue DPD packets (ISAKMP format) to query a
remote peer, and wait for a reply to recognize that it is
still alive. There are 3 auxiliary options: Detection Delay(s),
Detection Timeout(s), and DPD Action for DPD.
Detection Delay(s)
You can indicate the interval between
DPD query packets. The default value is
³0
seconds.
Detection Timeout(s)
You can indicate the length of
timeout when DPD cannot hear any DPD reply. The default
value is
±²0
seconds.
DPD Action
When DPD Timeout expires, the DPD will take
DPD Action to deal with the connection. You can select
Wait for Response to still wait for remote peer response, or
select
Suspend Connection
to stop passively recovering
the connection or select
Recover Connection
.
If IKE failed more than _times, block this unauthorized
IP for _ seconds
This feature is enabled by default. It
enables the Router to block unauthorized IP addresses.
Specify the number of times IKE must fail before the Router
blocks that unauthorized IP address.
Anti-replay
This protects the Router from anti-replay
attacks, when people try to capture your authentication
packets in an attempt to gain access. The feature is
enabled by default.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click More.
VPN > VPN Summary
VPN > VPN Summary
This page summarizes the comprehensive details of IPSec
VPN Tunnels that include Tunnel Name, Remote Gateway,
Remote Group, Local Group, Key Methods, Tunnel Status,
and Start/Stop/Detail Connection. Each field displays
information according to a pre-configured value of IPSec
tunnel separately, and each IPSec tunnel can be easily
commanded to start/stop connection here. VPN Summary
can help an administrator to manage and examine all
IPSec tunnels status.
Tunnel Name
The field displays the name of the tunnel.
Remote Gateway
The field displays the remote gateway.
If the pre-configured type is IP Addr., the field displays the
IP address of remote gateway. If the pre-configured type
of remote gateway is Any, the field displays ANY. If the
pre-configured type is FQDN, the field displays the FQDN
string directly.
Remote Group
The field displays the remote peer that
is designated for VPN communication after a IPSec VPN
tunnel is established. If the pre-configured type of the
remote group is IP Addr., the field displays the IP address
of the remote peer. If the pre-configured type of the
remote group is Subnet, the field displays the subnet type
“IP Address/Mask”. If the pre-configured type of remote
group is Host or Any, the field displays the “Host” or “Any”
directly.
Local Group
The field displays the local peer that is
designated for VPN communication after an IPSec VPN
tunnel is established. If the pre-configured type of local
group is IP Addr., the field displays the IP address of the
local peer. If the pre-configured type of local group is
Subnet, the field displays the subnet type “IP Address/
Mask”. If the pre-configured type of local group is Host,
the field displays the “Host” directly.
Key Methods
The field displays the IPSec authentication
and encryption key methods of the Key exchange Method
that is followed with the setting value of the Password
Forward Secrecy.
Tunnel Status
The field displays the status of IPSec
Tunnel as follows.
C
The Tunnel is Connected.
T
Try to Connect to Remote Peer.
Stop
The Tunnel is Stopped.
D
The Tunnel is Disabled.
Any
The Tunnel always waits for the connection from
the remote initiator.
NAT-T
The Tunnel enables the NAT-Traversal to allow
the remote initiator that is behind the NAT to construct
this IPSec Tunnel.
Start/Stop/Restart Connection
You can manually start/
stop IPSec connection according to pre-configured tunnel
settings. If the pre-configured type of remote gateway or
remote group is either
Any
or
NAT-Traversal
, the
Detai
l
button can also examine Remote Security Gateway
information.