User's Manual

Active as default route: Commonly used by the Dial-out connection which all packets will route
through the VPN tunnel to the Internet; therefore, active the function may degrade the Internet
performance.
Remote Host Name (Optional):(QWHUKRVWQDPHRIUHPRWH931GHYLFH,WLVDWXQQHOLGHQWL¿HU
from the Remote VPN device matches with the Remote hostname provided. If remote hostname
matches, tunnel will be connected; otherwise, it will be dropped.
Cautious: This is only when the router performs as a VPN server. This option should be
used by advanced users only.
Local Host 1DPH2SWLRQDO(QWHUKRVWQDPHRI/RFDO931GHYLFHWKDWLVFRQQHFWHGHVWDEOLVKHV
D931WXQQHO$VGHIDXOW5RXWHU¶VGHIDXOW+RVWQDPHLV
home.gateway.
IPSec: Enable for enhancing your L2TP VPN security.
Authentication: Authentication establishes the integrity of the datagram and ensures it is not
WDPSHUHGZLWKLQWUDQVPLW7KHUHDUHWKUHHRSWLRQV0HVVDJH'LJHVW0'6HFXUH+DVK
$OJRULWKP6+$RU121(6+$LVPRUHUHVLVWDQWWREUXWHIRUFHDWWDFNVWKDQ0'KRZHYHULWLV
slower.
MD5:$RQHZD\KDVKLQJDOJRULWKPWKDWSURGXFHVDíELWKDVK
SHA1: $RQHZD\KDVKLQJDOJRULWKPWKDWSURGXFHVDíELWKDVK
Encryption: Select the encryption method from the pull-down menu. There are four options, DES,
3DES, AES and NULL. NULL means it is a tunnel only with no encryption. 3DES and AES are
more powerful but increase latency.
DES: Stands for Data Encryption Standard, it uses 56 bits as an encryption method.
3DES: Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption
method.
AES: Stands for Advanced Encryption Standards, it uses 128 bits as an encryption method.
Perfect Forward Secrecy: &KRRVHZKHWKHUWRHQDEOH3)6XVLQJ'LI¿H+HOOPDQSXEOLFNH\
cryptography to change encryption keys during the second phase of VPN negotiation. This
IXQFWLRQZLOOSURYLGHEHWWHUVHFXULW\EXWH[WHQGVWKH931QHJRWLDWLRQWLPH'LI¿H+HOOPDQLVD
public-key cryptography protocol that allows two parties to establish a shared secret over an
XQVHFXUHGFRPPXQLFDWLRQFKDQQHOLHRYHUWKH,QWHUQHW7KHUHDUHWKUHHPRGHV02'3ELW
02'3ELWDQG02'3ELW02'3VWDQGVIRU0RGXODU([SRQHQWLDWLRQ*URXSV
Pre-shared Key:7KLVLVIRUWKH,QWHUQHW.H\([FKDQJH,.(SURWRFRODVWULQJIURPWR
FKDUDFWHUV%RWKVLGHVVKRXOGXVHWKHVDPHNH\,.(LVXVHGWRHVWDEOLVKDVKDUHGVHFXULW\SROLF\
DQGDXWKHQWLFDWHGNH\VIRUVHUYLFHVVXFKDV,36HFWKDWUHTXLUHDNH\%HIRUHDQ\,36HFWUDI¿F
can be passed, each router must be able to verify the identity of its peer. This can be done by
manually entering the pre-shared key into both sides (router or hosts).
&OLFN(GLW'HOHWHWRVDYH\RXUFKDQJHV
112