TP-Link Archer VR2800v Archer VR2800vDE V1 User Guide - Page 99

Pre-Shared Key, Perfect Forward Secrecy, Advanced, Perfect, Forward Secrecy, Status

Page 99 highlights

Chapter 13 VPN Server 9. Enter the Pre-Shared Key for IKE authentication. Then keep Perfect Forward Secrecy enabled. Note: Make sure Site A and Site B use the same key. 10. Leave the Advanced Settings as default value. Then click OK to save. 11. Configuration on Site B (remote network). Refer to step 2 configuration on Site A and make sure that Site A and Site B use the same pre-shared keys and Perfect Forward Secrecy settings. 12. The Status column will change to UP if the VPN connection has been set up successfully. 13. Check the VPN connection. You can ping site B' LAN IP from your computer in site A to verify that the IPSec VPN connection is set up correctly. Tips: To check the VPN connection, you can do the following. 1. On the host in Site A, press [Windows Logo] + [R] to open Run dialog. Input "cmd" and hit OK. 2. In the CLI window, type in "ping 192.168.2.x" ("192.168.2.x" can be IP address of any host in Site B). Then press [Enter]. 3. If Ping proceeds successfully (gets replies from host in Site B), the IPSec connection is working properly now. 14. Now IPSec VPN is implemented to establish a connection. Note: 1. The product supports a maximum of ten simultaneous connections. 2. If one of the site has been offline for a while, for example, if Site A has been disconnected, on Site B you need to click Disable and then click Enable after Site A back on line in order to re-establish the IPSec tunnel. 94

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141

94
Chapter 13
VPN Server
9. Enter the
Pre-Shared Key
for IKE authentication. Then keep
Perfect Forward Secrecy
enabled.
Note:
Make sure Site A and Site B use the same key.
10. Leave the
Advanced
Settings as default value. Then click
OK
to save.
11. Configuration on Site B (remote network). Refer to step 2 configuration on Site A
and make sure that Site A and Site B use the same
pre-shared keys
and
Perfect
Forward Secrecy
settings.
12. The
Status
column will change to
UP
if the VPN connection has been set up
successfully.
13. Check the VPN connection. You can ping site B’ LAN IP from your computer in site
A to verify that the IPSec VPN connection is set up correctly.
Tips:
To check the VPN connection, you can do the following.
1.
On the host in Site A, press
[Windows Logo]
+
[R]
to open Run dialog. Input “
cmd
” and hit
OK
.
2.
In the CLI window, type in “ping 192.168.2.x” (“192.168.2.x” can be IP address of any host in Site B). Then press [Enter].
3.
If Ping proceeds successfully (gets replies from host in Site B), the IPSec connection is working properly now.
14. Now IPSec VPN is implemented to establish a connection.
Note:
1.
The product supports a maximum of ten simultaneous connections.
2.
If one of the site has been offline for a while, for example, if Site A has been disconnected, on Site B you need to click
Disable
and then click
Enable
after Site A back on line in order to re-establish the IPSec tunnel.