Operation Manual

If the Configuration Mode is set to Simple, you have the option to set the TLS-Auth Key.
If the Configuration Mode is set to Advanced, set any of the following:
Root Certificate
Client Certificate
Client Key
TLS-Auth Key
DH Parameters
VPN Tunnels
VPN (virtual private network) tunnels are used to establish a secure connection to a remote network over a public
network. For example, VPN tunnels can be used across the Internet by an individual to connect to an office network
while traveling, or by two office networks to function as one network. The two networks set up a secure connection
across the (normally) unsecure Internet by assigning VPN encryption protocols.
Cradlepoint VPN tunnels use IPsec (Internet Protocol security) to authenticate and encrypt packets exchanged across
the tunnels. To set up a VPN tunnel with a Cradlepoint router on one end, there must be another device (usually a
router) that also supports IPsec on the other end.
IKE (Internet Key Exchange) is the security protocol in IPsec. IKE has two phases, phase 1 and phase 2. The router has
several different security protocol options for each phase, but the default selections will be sufficient for most users.
The VPN tunnel status page allows you to view the state of the VPN tunnels. If a tunnel fails to connect to the remote
site, check the System Logs for more information. You may double click on a cell to directly edit that information.
Click Add to configure a new VPN tunnel; click Edit to make changes to an existing tunnel.
151