D-Link DSR-250v2 Product Manual 2 - Page 109

Client mode, Fully Qualified Domain Name. This feature allows

Page 109 highlights

Client mode In this section, you will learn about the OpenVPN configuration in the Client mode. The fields available when the Client mode is selected are as follows: Field Mode Server IP Failover server IP Port Tunnel protocol Encryption algorithm Hash algorithm User-based authentication User name Password Certificate verification Certificate TLS authentication key TLS key Auto connect Description Select Client. VPN setting Enter the IP address/FQDN of the OpenVPN server. Select the type of identifier you want to provide for the failover mechanism at the Failover Server IP: IP Address or FQDN (Fully Qualified Domain Name). This feature allows configuring an additional OpenVPN server for the client, which will be used when the primary server is down. This is applicable only in client mode. Enter the port number on which the OpenVPN server (or Access Server) runs. Select either TCP or UDP. Select the encryption algorithm from the drop-down menu. Select the hash algorithm from the drop-down menu. This option provides an additional authentication method using a user name/password. It is disabled by default. Enter the user name. This field is available when User-based authentication is enabled. Enter the password. This field is available when User-based authentication is enabled. This method enables tunnel authentication to be with certificates. It is enabled by default. Select the profile which has list certificates uploaded for the configured client mode. Enabling this adds TLS authentication, which adds a layer of authentication. It can be enabled only when the TLS key is uploaded. It is disabled by default. Select the type of TLS certificate name. When you click the Certificate list link, it will redirect you to the Certificate Management page to add a new certificate and key. we can disable and enable,if enabled give we need to give interval

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

Client mode
In this section, you will learn about the OpenVPN configuration in the
mode.
Client
The fields available when the
is selected are as follows:
Client mode
Field
Description
Mode
Select
.
Client
VPN setting
Server IP
Enter the IP address/FQDN of the OpenVPN server.
Failover server IP
Select the type of identifier you want to provide for the failover mechanism at the Failover
Server IP:
or
(Fully Qualified Domain Name). This feature allows
IP Address
FQDN
configuring an additional OpenVPN server for the client, which will be used when the
primary server is down. This is applicable only in client mode.
Port
Enter the port number on which the OpenVPN server (or Access Server) runs.
Tunnel protocol
Select either
or
.
TCP
UDP
Encryption algorithm
Select the encryption algorithm from the drop-down menu.
Hash algorithm
Select the hash algorithm from the drop-down menu.
User-based authentication
This option provides an additional authentication method using a user name/password. It is
disabled by default.
User name
Enter the user name. This field is available when
is enabled.
User-based authentication
Password
Enter the password. This field is available when
is enabled.
User-based authentication
Certificate verification
This method enables tunnel authentication to be with certificates. It is enabled by default.
Certificate
Select the profile which has list certificates uploaded for the configured client mode.
TLS authentication key
Enabling this adds TLS authentication, which adds a layer of authentication. It can be
enabled only when the TLS key is uploaded. It is disabled by default.
TLS key
Select the type of TLS certificate name. When you click the
link, it will redirect
Certificate list
you to the
page to add a new certificate and key.
Certificate Management
Auto connect
we can disable and enable,if enabled give we need to give interval