Ike security descriptor, Ipsec security descriptor, Miscellaneous parameters – RCA 608WL User Manual

Page 200: Vpn server settings, Chapter 5

Advertising
background image

Chapter 5

Expert Configuration

E-DOC-CTC-20041126-0013 v1.0

198

IKE Security Descriptor

See

“ IKE Security Descriptors” on page 191

.

IPSec Security

Descriptor

See

“ IPSec Security Descriptors” on page 192

.

Miscellaneous

parameters

See

“ Miscellaneous parameters” on page 191

.

VPN Server settings

Comprises the following settings:



Virtual IP Range:

Specifies the range of IP addresses from which the VPN client addresses are
selected.



Netmask

Specifies the netmask provided to the VPN client. Use the dotted decimal
format.



Push IP

Check this box when you want the VPN server to take the initiative for
assigning an IP address to the VPN clients via IKE Mode Config.
When the check box is left unchecked, the VPN clients will request an IP
address from the VPN server.



Domain name

The domain name provided to the VPN clients via IKE Mode Config.



Primary DNS IP Address

The IP address of the primary DNS server, provided to the VPN clients via IKE
Mode Config. This is the primary DNS server in the local network that is open
to VPN clients.



Secondary DNS IP Address

The IP address of the secondary DNS server, provided to the VPN clients via
IKE Mode Config. This is the secondary DNS server in the local network that is
open to VPN clients.



Primary WINS IP Address

The IP address of the primary WINS server, provided to the VPN clients via IKE
Mode Config. This is the primary WINS server in the local network that is open
to VPN clients. A WINS server maps NETBIOS names to IP addresses.



Secondary WINS IP Address

The IP address of the secondary WINS server, provided to the VPN clients via
IKE Mode Config. This is the secondary WINS server in the local network that is
open to VPN clients.



XAuth

The SpeedTouch™ VPN server allows the use of the Extended Authorization
protocol with an internal user list. Two different types of Authentication
protocols can be selected: generic and chap. When the use of XAuth is
selected, a list of authorized users is to be composed. This is explained in

“ Authorized Users List” on page 199

.

Advertising
This manual is related to the following products:

620