D-Link DFL-1100 Product Manual - Page 62

VPN - Advanced Settings

Page 62 highlights

VPN - Advanced Settings Advanced settings for a VPN tunnel is used when the user needs to change some characteristics of the tunnel to, for example, try to connect to a third party VPN Gateway. The different settings per tunnel are: Limit MTU With this setting it is possible to limit the MTU (Max Transferable Unit) of the VPN tunnel. IKE Mode Specify if Main mode IKE or Aggressive Mode IKE should be used when establishing outbound VPN Tunnels. Inbound main mode connections will always be allowed. Inbound aggressive mode connections will only be allowed if this setting is set to aggressive mode. IKE DH Group Here it is possible to configure the Diffie-Hellman group to 1 (modp 768-bit), 2 (modp 1024-bit), or 5 (modp 1536-bit). PFS - Perfect Forward Secrecy If PFS, Perfect Forwarding Secrecy, is enabled, a new Diffie-Hellman exchange is performed for each phase-2 negotiation. While this is slower, it makes sure that no keys are dependent on any other previously used keys; no keys are extracted from the same initial keying material. PFS is used to ensure that in the unlikely event an encryption key is compromised, no subsequent keys could be derived from that compromised key. NAT Traversal Here it is possible to configure how the NAT Traversal code should behave. Disabled - The firewall will not send the necessary Vendor ID's to indicate NAT-T support when setting up the tunnel. On if supported and need NAT - Will only use NAT-T if one of the VPN gateways is behind a NAT device. On if supported - Always tries to use NAT-T when setting up the tunnel. Keepalives No keepalives - Keep-alive is disabled. Automatic keepalives - The firewall will send ICMP pings to IP Addresses automatically discovered from the VPN Tunnel settings. Manually configured IP addresses - Configure the source and destination IP addresses used when sending the ICMP pings. 62

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

62
VPN – Advanced Settings
Advanced settings for a VPN tunnel is used when the user needs to change some
characteristics of the tunnel to, for example, try to connect to a third party VPN Gateway.
The
different settings per tunnel are:
Limit MTU
With this setting it is possible to limit the MTU (Max Transferable Unit) of the VPN tunnel.
IKE Mode
Specify if Main mode IKE or Aggressive Mode IKE should be used when establishing
outbound VPN Tunnels. Inbound main mode connections will always be allowed. Inbound
aggressive mode connections will only be allowed if this setting is set to aggressive mode.
IKE DH Group
Here it is possible to configure the Diffie-Hellman group to 1 (modp 768-bit), 2 (modp
1024-bit), or 5 (modp 1536-bit).
PFS – Perfect Forward Secrecy
If PFS, Perfect Forwarding Secrecy, is enabled, a new Diffie-Hellman exchange is
performed for each phase-2 negotiation. While this is slower, it makes sure that no keys are
dependent on any other previously used keys; no keys are extracted from the same initial
keying material. PFS is used to ensure that in the unlikely event an encryption key is
compromised, no subsequent keys could be derived from that compromised key.
NAT Traversal
Here it is possible to configure how the NAT Traversal code should behave.
Disabled
- The firewall will not send the necessary Vendor ID's to indicate NAT-T support
when setting up the tunnel.
On if supported and need NAT
- Will only use NAT-T if one of the VPN gateways is
behind a NAT device.
On if supported
- Always tries to use NAT-T when setting up the tunnel.
Keepalives
No keepalives
– Keep-alive is disabled.
Automatic keepalives
- The firewall will send ICMP pings to IP Addresses automatically
discovered from the VPN Tunnel settings.
Manually configured IP addresses
- Configure the source and destination IP addresses
used when sending the ICMP pings.