- Patton VoIP SoHo Router Getting Started Guide

28
SmartLink 4020 Getting Started Guide 4 • Network—WAN
WAN Priority Tag (IEEE 802.1q) ............................................................................................................34
Saving your work ............................................................................................................................................34
QoS (Quality of Service)........................................................................................................................................35
Enable Voice QoS ...........................................................................................................................................35
Assured Bandwidth for Voice ..........................................................................................................................35
Maximum Uplink Bandwidth Allowed ...........................................................................................................35
Saving your work ............................................................................................................................................35
ToS/DiffServ.........................................................................................................................................................35
Saving your work ............................................................................................................................................36
IPSec Configuration ..............................................................................................................................................36
Select Tunnel to view/modify .........................................................................................................................36
Enable tunnel 1 ...............................................................................................................................................36
Remote IP Address range ................................................................................................................................36
Remote security gateway .................................................................................................................................36
Security Mode .................................................................................................................................................36
Outbound AH SPI (DEC) ..............................................................................................................................36
Outbound AH Authentication Algorithm .......................................................................................................37
Outbound AH Authentication Key (HEX) .....................................................................................................37
Outbound ESP SPI (DEC) .............................................................................................................................37
Outbound ESP Encryption Algorithm ............................................................................................................37
Outbound ESP Authentication Algorithm ......................................................................................................37
Outbound ESP Encryption Key (HEX) ..........................................................................................................37
Outbound ESP Authentication Key (HEX) ....................................................................................................37
Inbound AH SPI (DEC) .................................................................................................................................37
Inbound AH Authentication Algorithm ..........................................................................................................37
Inbound AH Authentication Key (HEX) ........................................................................................................37
Inbound ESP SPI (DEC) ................................................................................................................................37
Inbound ESP Encryption Algorithm ...............................................................................................................37
Inbound ESP Authentication Algorithm .........................................................................................................37
Inbound ESP Encryption Key (HEX) .............................................................................................................37
Inbound ESP Authentication Key (HEX) .......................................................................................................38
Saving your work ............................................................................................................................................38