Step 4 Verify the connectivity of the IPsec VPN Tunnel.Ĭhoose the menu VPN > IPsec > IPsec SA to load the following page. Select Include as Type, enter the VPN Router’s LAN Subnet Address and Subnet Mask, it’s 192.168.0.0, 255.255.255.0. (7) Choose the menu Policy, don’t tick Obtain Topology Automatically or Tunnel All. PFS Exchange and Compress Algorithm are disabled. (6) Choose the menu Phase 2, under the Proposal Parameters, the Transform Algorithm, HMAC Algorithm are the same with VPN Router’s, we use esp-3des, md5 here. (5) Choose the menu Phase 1, under the Proposal Parameters, the Exchange Type, DH Exchange, Cipher Algorithm, and Hash Algorithm are the same with VPN Router’s, we use aggressive, group 2, 3des, md5 here. (4) Choose the menu Authentication > Credentials. Specify 321 as FQDN String in Local Identify section and specify 123 as FQDN String in Remote Identify section. Select Fully Qualified Domain Name as Identification Type. Select Mutual PSK as Authentication Method. (2) Choose the menu Name Resolution, don’t tick the Enable DNS and the Enable WINS. Select Use an existing adapter and current address as Adapter Mode. Specify Host Name or IP Address as 10.10.10.10. Once the VPN server or client is behind a NAT device, the proposal cannot be specified as ah-md5 or as –sha1, otherwise, the VPN tunnel can’t be established.
0 Comments
Leave a Reply. |