LINKSYS WRT54G3GV2 Wireless-G Router for Mobile Broadband User Manual

LINKSYS LLC Wireless-G Router for Mobile Broadband Linksys WRT54G3GV2 ST User Guide

a href="https://usermanual.wiki/LINKSYS" itemprop="url"> LINKSYS >

Contents

Manual 2

Chapter 3 Advanced Configuration21Wireless-G Router for Mobile BroadbandIP Addr.  Enter the IP address of the remote VPN device. This can be static or dynamic, depending on the settings of the remote VPN device. The IP address you enter is NOT the IP address of the local Gateway. IP Address  Enter the IP address of the VPN device at the other end of the tunnel.FQDN  Enter the Fully Qualified Domain Name (FQDN) of the remote VPN device.Domain  Name  Enter  the  domain  name  of  the VPN device at the other end of the tunnel.Any  Select this option to have the Router accept requests from any IP address.Encryption  Using encryption helps make your connection more secure. Select DES or 3DES (3DES is recommended because it is more secure). You may choose either of these, but it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. If you do not choose to encrypt your data, select Disabled. Authentication  Authentication  acts  as  another  level of  security.  Select  MD5  or  SHA  (SHA  is  recommended because it is more secure). As with encryption, either of these may be selected, if the VPN device at the other end of the tunnel is using the same type of authentication.Key ManagementA  key  is  a  string  of  letters  and/or  numbers  used  for authentication  or  encryption.  Select  Auto  (IKE)  for automatic  key  management  by  the  Internet  Key Exchange (IKE) protocol, or select Manual for manual key management. The two methods are described below.Auto (IKE)PFS  PFS  (Perfect  Forward  Secrecy)  enables  automatic re-keying to enhance security. Select Enabled to ensure that the initial key exchange and IKE proposals are secure. Otherwise, select Disabled.Pre-shared  Key  Enter  a  series  of  numbers  or  letters. Based on this word, which MUST be entered at both ends of the tunnel if this method is used, a key is generated to scramble  (encrypt)  the  data being  transmitted over  the tunnel, where it is unscrambled (decrypted). You may use any  combination  of  up  to  24  numbers  or  letters  in  this field. No special characters or spaces are allowed. Key  Lifetime  You  may  have  the  key  expire  at  the  end of a time period.  Enter the number of seconds you’d like the key to be useful, or leave it blank for the key to last indefinitely. The default is 3600 seconds.••ManualVPN> Manual Key ManagementEncryption  Key  If  you  chose  DES  for  your  Encryption setting, enter 16 hexadecimal characters, or if you chose 3DES, enter 48 hexadecimal characters.Authentication  Key  If  you  chose  MD5  for  your Authentication setting, enter 32 hexadecimal characters, or if you chose SHA, enter 40 hexadecimal characters.Inbound SPI  Enter the Inbound Security Parameter Index (SPI). This is the Outbound SPI for the remote VPN device.Outbound  SPI  Enter  the Outbound  Security  Parameter Index  (SPI). This  is  the  Inbound  SPI  for  the  remote VPN device.StatusThe status of the connection is shown.The  following  settings  are  available  if  Auto  (IKE)  is selected.Connect  Click this button to connect your VPN tunnel. View Logs  To view the logs, click View Logs.Incoming Log TableThe  table  shows  the  Source  IP  and  Destination  Port Number of incoming traffic.VPN > Incoming Log TableClick Refresh to update the log. Click Close to return to the VPN screen.Advanced Settings  Before configuring these settings, click Save Settings on the VPN screen to apply your changes, or click Cancel Changes to cancel your changes.Then click  Advanced  Settings  to  configure  additional settings. Advanced IPSec VPN Tunnel SetupPhase 1 is when the two endpoints negotiate parameters for  key  exchange.  Phase  2  is  when  they  negotiate parameters for data exchange.
Chapter 3 Advanced Configuration22Wireless-G Router for Mobile BroadbandVPN> Advanced IPSec VPN Tunnel SetupPhase 1Phase 1 is used to create a Security Association (SA), often called the IKE SA. After Phase 1 is completed, Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions.Operation  Mode  There  are  two  modes:  Main  and Aggressive,  and  they  exchange  the  same  IKE  payloads in  different  sequences.  Main  mode  is  more  common; however, some  people  prefer Aggressive mode  because it is faster.  Main mode is for normal usage and includes more authentication requirements than Aggressive mode. Main  mode  is recommended because  it is  more  secure. No matter which mode is selected, the Router will accept both Main and Aggressive requests from the remote VPN device.Proposal 1A proposal is a set of parameters that the initiator sends and the responder examines for acceptability.Encryption  Select the length of the key used to encrypt and  decrypt  ESP  packets.  Select  DES  or  3DES.  3DES  is recommended because it is more secure.Authentication  Select the method used to authenticate ESP  packets.  Select  MD5  or  SHA.  SHA is  recommended because it is more secure.Group  Select  a Diffie-Hellman  group, 768-bit  or 1024-bit.  Diffie-Hellman  refers  to  a  cryptographic  technique that  uses  public  and  private  keys  for  encryption  and decryption.Key Lifetime  You may optionally select to have the key expire at the end of a time period of your choosing.  Enter the number of seconds you’d like the key to be used until a re-key negotiation between each endpoint is completed. The default is 3600 seconds.Phase 2ProposalEncryption  The encryption method selected in Phase 1 is displayed.Authentication  The authentication method  selected in Phase 1 is displayed.PFS  The status of PFS is displayed.Group  Select  a Diffie-Hellman  group, 768-bit  or 1024-bit.  Diffie-Hellman  refers  to  a  cryptographic  technique that  uses  public  and  private  keys  for  encryption  and decryption.Key  Lifetime  The  key  lifetime  selected  in  Phase  1  is displayed.Other SettingNAT Traversal  Select this option if the remote device is behind a Network Address Translation (NAT) device.NetBIOS broadcast  Select this option to enable NetBIOS traffic to pass through the VPN tunnel. This should be used if the local network does not include a WINS server and the remote device(s) need  to  find  local devices by their NetBIOS names.Anti-replay  Packets  sent  through  an  IPSec  tunnel contain sequencing numbers  to let the receive detect  if a substitution has occurred. Select this option to enable the Anti-replay protection, which keeps track of sequence numbers  as  packets  arrive,  ensuring  security  at  the  IP packet level.Keep-Alive  Select  this  option  to  have  the  Router periodically check your Internet connection. If the tunnel is  disconnected,  then  the  Router  will  automatically  re-establish your connection. If IKE failed more than _ times, block this unauthorized IP  for  __  seconds  IKE  failure may  indicate  an  intrusion attempt. You can set a limit on the number of consecutive failed requests allowed from the same IP address. You can also specify the amount of time that the Router ignores further requests from that IP address.Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Then close this screen to return to the VPN screen.On  the  VPN  screen,  click  Save  Settings  to  apply  your changes,  or  click  Cancel  Changes  to  cancel  your changes.
Download:
Mirror Download [FCC.gov]
Document ID855799
Application IDKkQSoqUXi8L3rX5z28cIlw==
Document DescriptionManual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize167.89kB (2098628 bits)
Date Submitted2007-10-17 00:00:00
Date Available2007-10-17 00:00:00
Creation Date2007-10-17 08:36:38
Producing SoftwareAdobe PDF Library 7.0
Document Lastmod2007-10-17 08:38:20
Document TitleLinksys WRT54G3GV2-ST User Guide
Document CreatorAdobe InDesign CS2 (4.0.5)
Document Author: Linksys
FCC ID Filing: Q87-WRT54G3GV2

Navigation menu