D-Link DSR-250v2 Product Manual 1 - Page 104

AES-128 BF, CBC AES-192, AES-256, SHA1 SHA256, SHA512, Local authentication list, Server Policies

Page 104 highlights

Port Tunnel protocol Encryption algorithm Hash algorithm Tunnel type Client to client User-based authentication Local authentication Certificate verification Certificate TLS authentication key TLS key DH key Server policies Remote networks Local networks Enter the port number on which the OpenVPN server runs. The default port is 1194. Select either TCP or UDP to communicate with the remote host. Select the encryption algorithm from the drop-down menu. The options are AES-128, BFCBC, AES-192, and AES-256. Select the hash algorithm from the drop-down menu. The options are SHA1, SHA256, and SHA512. Select either Full Tunnel or Split Tunnel. Full Tunnel mode sends all the traffic from the client across the VPN tunnel to the gateway. Split Tunnel mode only sends traffic to the private LAN based on pre-specified client routes. If you select Split Tunnel, refer to Local Networks to create local networks. Enable this field to allow OpenVPN clients to communicate with each other in the split tunnel case. By default, it is disabled. This option provides an additional authentication method. You can enable this field to select an authentication server. Select a configured local authentications saved on the local server. To add a new local authentication server, click the Local authentication list link. For more details, refer to local authentication list section. Enable or disable certificate verification. This method does not require the client certificate; the client authenticates using the username/password only. It is enabled by default. Select the profile which has a list of certificates uploaded for the configured mode server /client. Enabling this adds TLS authentication, which adds a layer of authentication. It can be checked only when the TLS key is uploaded. It is disabled by default. Select the type of TLS certificate name. Select the DH key from the drop-down list. Advanced settings Enable or disable the Server Policies feature; if enabled, configure the Server policies under the Server policies section. Enable or disable the Remote networks feature; if enabled, configure this feature in the remote networks section. Enable or disable the Local networks feature; if enabled, configure this feature in the Local networks section. This section is available when you select Split Tunnel as the Tu nnel type. Client List It allows the user to generate the client's configuration. Furthermore, OmniSSL is an adaptable feature as it supports and gets installed on various operating systems following their respective procedures. The fields available on the Client list table are as follows: Field User name Update at Description It displays the OmniSSL client name. It displays the date and time when the user's certificates were last updated.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

Port
Enter the port number on which the OpenVPN server runs. The default port is 1194.
Tunnel protocol
Select either
or
to communicate with the remote host.
TCP
UDP
Encryption algorithm
Select the encryption algorithm from the drop-down menu. The options are
,
AES-128 BF-
,
, and
.
CBC AES-192
AES-256
Hash algorithm
Select the hash algorithm from the drop-down menu. The options are
,
,
SHA1 SHA256
and
.
SHA512
Tunnel type
Select either
or
. Full Tunnel mode sends all the traffic from the
Full Tunnel
Split Tunnel
client across the VPN tunnel to the gateway. Split Tunnel mode only sends traffic to the
private LAN based on pre-specified client routes. If you select
, refer to
Split Tunnel
Local Networks to create local networks.
Client to client
Enable this field to allow OpenVPN clients to communicate with each other in the split
tunnel case. By default, it is disabled.
User-based authentication
This option provides an additional authentication method. You can enable this field to
select an authentication server.
Local authentication
Select a configured local authentications saved on the local server. To add a new local
authentication server, click the
link. For more details, refer to
Local authentication list
local authentication list section.
Certificate verification
Enable or disable certificate verification. This method does not require the client
certificate; the client authenticates using the username/password only. It is enabled by
default.
Certificate
Select the profile which has a list of certificates uploaded for the configured mode server
/client.
TLS authentication key
Enabling this adds TLS authentication, which adds a layer of authentication. It can be
checked only when the TLS key is uploaded. It is disabled by default.
TLS key
Select the type of TLS certificate name.
DH key
Select the DH key from the drop-down list.
Advanced settings
Server policies
Enable or disable the
feature; if enabled, configure the Server policies
Server Policies
under the Server policies section.
Remote networks
Enable or disable the
feature; if enabled, configure this feature in the
Remote networks
remote networks section.
Local networks
Enable or disable the
feature; if enabled, configure this feature in the
Local networks
Local networks section. This section is available when you select
as the
Split Tunnel
Tu
.
nnel type
Client List
It allows the user to generate the client’s configuration. Furthermore, OmniSSL is an adaptable feature as it supports and gets installed on
various operating systems following their respective procedures.
The fields available on the
table are as follows:
Client list
Field
Description
User name
It displays the OmniSSL client name.
Update at
It displays the date and time when the user’s certificates were last updated.