Parental control allows you to block web sites with the specific URL. You can also define time
periods and days during which the Device performs parental control on a specific user.
17.2 The Parental Control Screen
Use this screen to enable parental control, view the parental control rules and schedules.
Click Security > Parental Control to open the following screen.
Figure 124 Security > Parental Control
Parental Control
The following table describes the fields in this screen.
Table 93 Security > Parental Control
LABELDESCRIPTION
Parental
Control
Add new PCPClick this if you want to configure a new parental control rule.
#This shows the index number of the rule.
StatusThis indicates whether the rule is active or not.
PCP NameThis shows the name of the rule.
Home Network
User (MAC)
VMG8324-B10A / VMG8324-B30A Series User’s Guide207
Select Enable to activate parental control.
A yellow bulb signifies that this rule is activ e. A gra y bulb signifies that this rule is not acti ve.
This shows the MAC address of the LAN user’s computer to which this rule applies.
Chapter 17 Parental Control
Table 93 Security > Parental Control (continued)
LABELDESCRIPTION
Internet Access
Schedule
Network
Service
Website BlockThis shows whether the website block is configured. If not, None will be shown.
ModifyClick the Edit icon to go to the screen where you can edit the rule.
ApplyClick Apply to save your changes.
CancelClick Cancel to restore your previously saved settings.
This shows the day(s) and time on which parental control is enabled.
This shows whether the network service is configured. If not, None will be shown.
Click the Delete icon to delete an existing rule.
17.2.1 Add/Edit a Parental Control Rule
Click Addnew PCP in the Parental Control screen to add a new rule or click the Edit icon next to
an existing rule to edit it. Use this screen to configure a restricted access schedule and/or URL
filtering settings to block the users on your network from accessing certain web sites.
Figure 125 Parental Control Rule: Add/Edit
208
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 17 Parental Control
The following table describes the fields in this screen.
Table 94 Parental Control Rule: Add/Edit
LABELDESCRIPTION
General
ActiveSelect the checkbox to activate this parental control rule.
Parental
Control Profile
Name
Home Network
User
Internet Access Schedule
DaySelect check boxes for the days that you want the Device to perform parental control.
TimeDrag the time bar to define the time that the LAN user is allowed access.
Network Service
Network
Service Setting
Add new
service
#This shows the index number of the rule. Select the checkbox next to the rule to activate it.
Service NameThis shows the name of the rule.
Protocol:PortThis shows the protocol and the port of the rule.
ModifyClick the Edit icon to go to the screen where you can edit the rule.
Enter a descriptive name for the rule.
Select the LAN user that you want to apply this rule to from the drop-down list box. If you
select Custom, enter the LAN user’s MAC address. If you select All, the rule applies to all
LAN users.
If you select Block, the Device prohibits the users from viewing the Web sites with the URLs
listed below.
If you select Allow, the Device blocks access to all URLs except ones listed below.
Click this to show a screen in which you can add a new service rule. You can configure the
Service Name, Protocol, and Name of the new rule.
Click the Delete icon to delete an existing rule.
Blocked Site/
URL Keyword
ApplyClick this button to save your settings back to the Device.
CancelClick Cancel to restore your previously saved settings.
Click Add to show a screen to enter the URL of web site or URL keyword to which the Device
blocks access. Click Delete to remove it.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
209
Chapter 17 Parental Control
210
VMG8324-B10A / VMG8324-B30A Series User’s Guide
CHAPTER 18
18.1 Overview
You can define time periods and days during which the Device performs scheduled rules of certain
features (such as Firewall Access Control) in the Scheduler Rule screen.
18.2 The Scheduler Rule Screen
Use this screen to view, add, or edit time schedule rules.
Click Security > Scheduler Rule to open the following screen.
Figure 126 Security > Scheduler Rule
Scheduler Rule
The following table describes the fields in this screen.
Table 95 Security > Scheduler Rule
LABELDESCRIPTION
Add new ruleClick this to create a new rule.
#This is the inde x num ber of the entry.
Rule NameThis shows the name of the rule.
DayThis shows the day(s) on which this rule is enabled.
TimeThis shows the period of time on which this rule is enabled.
DescriptionThis shows the description of this rule.
ModifyClick the Edit icon to edit the schedule.
Click the Delete icon to delete a scheduler rule.
Note: You cannot delete a scheduler rule once it is applied to a certain feature.
VMG8324-B10A / VMG8324-B30A Series User’s Guide211
Chapter 18 Scheduler Rule
18.2.1 Add/Edit a Schedule
Click the Add button in the Scheduler Rule screen or click the Edit icon next to a schedule rule to
open the following screen. Use this screen to configure a restricted access schedule.
Figure 127 Scheduler Rule: Add/Edit
The following table describes the fields in this screen.
Table 96 Scheduler Rule: Add/Edit
LABELDESCRIPTION
Rule NameEnter a name (up to 31 printable English keyboard characters, not including spaces) for this
schedule.
DaySelect check boxes for the days that you want the Device to perform this scheduler rule.
Time if Day
Range
DescriptionEnter a description for this scheduler rule.
ApplyClick Apply to save your changes.
CancelClick Cancel to exit thi s screen without saving.
Enter the time period of each day, in 24-hour format, during which the rule will be enfo rced.
212
VMG8324-B10A / VMG8324-B30A Series User’s Guide
CHAPTER 19
19.1 Overview
The Device can use certificates (also called digital IDs) to authenticate users. Certificates are based
on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
Certificates provide a way to exchange public keys for use in authentication.
19.1.1 What You Can Do in this Chapter
•The Local Certificates screen lets you generate certification requests and import the Device's
CA-signed certificates (Section 19.4 on page 216).
•The Trusted CA screen lets you save the certificates of trusted CAs to the Device (Section 19.4
on page 216).
Certificates
19.2 What You Need to Know
The following terms and concepts may help as you read through this chapter.
Certification Authority
A Certification Authority (CA) issues certificates and guarantees the identity of each certificate
owner. There are commercial certification authorities like CyberTrust or VeriSign and government
certification authorities. The certification authority uses its private key to sign certificates. Anyone
can then use the certification authority's public key to v erify the certificates. Y ou can use the Device
to generate certification requests that contain identifying information and public keys and then send
the certification requests to a certification authority.
19.3 The Local Certificates Screen
Click Security >Certificates to open the Local Certificates screen. This is the Device’ s summary
list of certificates and certification requests.
Figure 128 Security > Certificates > Local Certificates
VMG8324-B10A / VMG8324-B30A Series User’s Guide213
Chapter 19 Certificates
The following table describes the labels in this screen.
Table 97 Security > Certificates > Local Certificates
LABELDESCRIPTION
Private Key is
protected by a
password
Browse...Click this to find the certificate file you want to upload.
Import Certificate Click this button to save the certificate that you have enrolled from a certification
Create Certificate
Request
Current FileThis field displays the name used to identify this certificate. It is recommended that you
SubjectThis field displays identifying information about the certificate’s owner, such as CN
IssuerThis field displays identifying information about the certificate’s issuing certification
Valid FromThis field displays the date that the certificate becomes applicable. The text displays in
Valid ToThis field displays the date that the certificate expires. The text displays in red and
ModifyClick the View icon to open a screen with an in-depth list of information about the
Select the checkbox and enter the private key into the text box to store it on the Device.
The private key should not exceed 63 ASCII characters (not including spaces).
authority from your computer to the Device.
Click this button to go to the screen where you can have the Device generate a
certification request.
give each certificate a unique name.
(Common Name), OU (Organizational Unit or department), O (Organization or company)
and C (Country). It is recommended that each certificate have unique subject
information.
authority, such as a common name, organizational unit or department, organization or
company and country.
red and includes a Not Yet Valid! message if the certificate has not yet become
applicable.
includes an Expiring! or Expired! message if the certificate is about to expire or has
already expired.
certificate (or certification request).
For a certification request, click Load Signed to import the signed certificate.
Click the Remove icon to delete the certificate (or certificatio n request). You cannot
delete a certificate that one or more features is configured to use.
19.3.1 Create Certificate Request
Click Security > Certificates > Local Certificates and then Create Certificate Request to
open the following screen. Use this screen to have the Device generate a certification request.
Figure 129 Create Certificate Request
214
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 19 Certificates
The following table describes the labels in this screen.
Table 98 Create Certificate Request
LABELDESCRIPTION
Certificate
Name
Common Name Select Auto to have the Device configure this field automatically. Or select Customize to
Organization
Name
State/Province
Name
Country/Region
Name
ApplyClick Apply to save your changes.
CancelClick Cancel to exit this screen without saving.
Type up to 63 ASCII characters (not including spaces) to identify this certificate.
enter it manually.
Type the IP address (in dotted decimal notation), domain name or e-mail address in the
field provided. The domain name or e-mail address can be up to 63 ASCII characters. The
domain name or e-mail address is for identification purposes only and can be any string.
Type up to 63 characters to identify the company or group to which the certificate owner
belongs. You may use any character, including spaces, but the Device drops trailing spac es.
Type up to 32 characters to identify the state or province where the certificate owner is
located. You may use any character, including spaces, but the Device drops trailing spaces.
Select a country to identify the nation where the certificate owner is located.
After you click Apply, the following screen displays to notify you that you need to get the certificate
request signed by a Certificate Authority. If you already have, click Load_Signed to import the
signed certificate into the Device. Otherwise click Back to return to the Local Certificates screen.
Figure 130 Certificate Request Created
19.3.2 Load Signed Certificate
After you create a certificate request and have it signed by a Certificate Authority, in the Local
Certificates screen click the certificate request’s Load Signed icon to import the signed certificate
into the Device.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
215
Chapter 19 Certificates
Note: You must remove any spaces from the certificate’s filename before you can import
it.
Figure 131 Load Signed Certificate
The following table describes the labels in this screen.
Table 99 Load Signed Certificate
LABELDESCRIPTION
Certificate
Name
CertificateCopy and paste the signed certificate into the text box to store it on the Device.
ApplyClick Apply to save your changes.
CancelClick Cancel to exit this screen without saving.
This is the name of the signed cert ificate.
19.4 The Trusted CA Screen
Click Security > Certificates > Trusted CA to open the following screen. This screen displays a
summary list of certificates of the certification authorities that you have set the Device to accept as
trusted. The Device accepts any valid certificate signed by a certification authority on this list as
216
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 19 Certificates
being trustworthy; thus you do not need to import any certificate that is signed by one of these
certification authorities.
Figure 132 Security > Certificates > Trusted CA
The following table describes the fields in this screen.
Table 100 Security > Certificates > Trusted CA
LABELDESCRIPTION
Import
Certificate
#This is the index number of the entry.
NameThis field displays the name used to identify this certificate.
SubjectThis field displays information that identifies the owner of the certificate, such as Common
TypeThis field displays general information about the certificate. ca means that a Certification
ModifyClick the View icon to open a screen with an in-depth list of information about the
Click this button to open a screen where you can save the certificate of a certification
authority that you trust to the Device.
Name (CN), OU (Organizational Unit or department), Organization (O), State (ST) and
Country (C). It is recommended that each certificate have unique subject information.
Authority signed the certificate.
certificate (or certification request).
Click the Remove button to delete the certificate (or certification request). You cannot
delete a certificate that one or more features is configured to use.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
217
Chapter 19 Certificates
19.4.1 View Trusted CA Certificate
Click the View icon in the Trusted CA screen to open the following screen. Use this screen to view
in-depth information about the certification authority’s certificate.
Figure 133 Trusted CA: View
The following table describes the fields in this screen.
Table 101 Trusted CA: View
LABELDESCRIPTION
NameThis field displays the identifying name of this certificate.
TypeThis field displays general information about the certificate. ca means that a Certification
Authority signed the certificate.
SubjectThis field displays information that identifies the owner of the certificate, such as Common
CertificateThis read-only text box displays the certificate in Privacy Enhanced Mail (PEM) format. PEM
BackClick Back to return to the previous screen.
Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
uses base 64 to convert the binary certificate into a printable form.
You can cop y and past e the certific ate in to an e-ma il to se nd to fr iends or col lea gues or yo u
can copy and paste the certificate into a text editor and save the file on a management
computer for later distribution (via floppy disk for example).
218
VMG8324-B10A / VMG8324-B30A Series User’s Guide
19.4.2 Import Trusted CA Certificate
Click the Import Certificate button in the Trusted CA screen to open the following screen. The
Device trusts any valid certificate signed by any of the imported trusted CA certificates.
Figure 134 Trusted CA: Import Certificate
The following table describes the fields in this screen.
Chapter 19 Certificates
Table 102 Trusted CA: Import Certificate
LABELDESCRIPTION
Certificate File
Path
Enable Trusted
CA for 802.1x
Authentication
CertificateCopy and paste the certificate into the text box to store it on the Device.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving.
Type in the location of the certificate you want to upload in this field or click Browse ... to
find it.
If you select this checkbox, the trusted CA will be used for 802.1x authentication. The
selected trusted CA will be displayed in the Network Setting > Broadband > 802.1x: Edit screen.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
219
Chapter 19 Certificates
220
VMG8324-B10A / VMG8324-B30A Series User’s Guide
CHAPTER 20
Local Network
Remote Network
VPN Tunnel
20.1 Overview
A virtual private network (VPN) provides secure communications over the the Internet. Internet
Protocol Security (IPSec) is a standards-based VPN that provides confidentiality , data integrity, and
authentication. This chapter shows you how to configure the Device’s VPN settings.
20.2 The IPSec VPN General Screen
Use this screen to view and manage your VPN tunnel policies. The following figure helps explain the
main fields in the web configurator.
Figure 135 IPSec Fields Summary
VPN
Click Security > IPSec VPN to open this screen as shown next.
Figure 136 Security > IPSec VPN
VMG8324-B10A / VMG8324-B30A Series User’s Guide221
Chapter 20 VPN
This screen contains the following fields:
Table 103 Security > IPSec VPN
LABELDESCRIPTION
Add New
Connection
#This displays the index number of an entry.
StatusThis displays whether the VPN policy is enabled (Enable) or not (Disable).
Connection Name The name of the VPN policy.
Remote GatewayThis is the IP address of the remote IPSec router in the IKE SA.
Local AddressesThis displays the IP address(es) on the LAN behind your Device.
Remote
Addresses
DeleteClick the Edit icon to modify the VPN policy.
Click this button to add an item to the list.
This displays the IP address(es) on the LAN behind the remote IPSec’s router.
Click the Delete icon to delete the VPN policy.
20.3 The IPSec VPN Add/Edit Screen
Use these settings to add or edit VPN policies. Click the Add New Connection button in the
Security > VPN screen to open this screen as shown next.
222
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Figure 137 Security > IPSec VPN: Add/Edit
Chapter 20 VPN
This screen contains the following fields:
Table 104 Security > IPSec VPN: Add/Edit
LABELDESCRIPTION
ActiveSelect this to activate this VPN policy.
IPSec Connection
Name
Remote IPSec
Gateway Address
T unnel access
from local IP
addresses
Enter the name of the VPN policy.
Enter the IP address of the remote IPSec router in the IKE SA.
Select Single Address to have only one local LAN IP address use the VPN tunnel. Select
Subnet to specify local LAN IP addresses by their subnet mask.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
223
Chapter 20 VPN
Table 104 Security > IPSec VPN: Add/Edit
LABELDESCRIPTION
IP Address for
VPN
IP SubnetmaskIf Subnet is selected, enter the subnet mask to identify the network address.
T unnel access
from remote IP
addresses
IP Address for
VPN
IP SubnetmaskIf Subnet is selected, enter the subnet mask to identify the network address.
ProtocolSelect which protocol you want to use in the IPSec SA. Choices are:
If Single Address is selected, enter a (static) IP address on the LAN behind your Device.
If Subnet is selected, specify IP addresses on a network by their subne t mask by entering
a (static) IP address on the LAN behind your Device. Then enter the subnet mask to
identify the network address.
Select Single Address to have only one remote LAN IP address use the VPN tunnel.
Select Subnet to specify remote LAN IP addresses by their subnet mask.
If Single Address is selected, enter a (static) IP address on the LAN behind the remote
IPSec’s router.
If Subnet is selected, specify IP addresses on a network by their subne t mask by entering
a (static) IP address on the LAN behind the remote IPSec’s router. Then enter the subnet
mask to identify the network address.
AH (RFC 2402) - provides integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not encryption. If you select AH, you must select an
Integraty Algorithm.
ESP (RFC 2406) - provides encryption and the same services offered by AH, but its
authentication is weaker. If you select ESP, you must select an Encryption Agorithm
and Integraty Algorithm.
Both AH and ESP increase processing requirements and latency (delay). The Device and
remote IPSec router must use the same active protocol.
Key Exchange
Method
Select the key exchange method:
Auto(IKE) - Select this to use automatic IKE key management VPN connection policy.
Manual - Select this option to configure a VPN connection policy that uses a manual key
instead of IKE key management. This may be useful if you have problems with IKE key
management.
Note: Only use manual key as a temporary solution, because it is not as secure as a regular
IPSec SA.
Authentication
Method
Pre-Shared KeyType your pre-shared key in this fiel d. A pre -s h ar ed key identifies a communicating party
Local ID TypeSelect IP to identify the Device by its IP address.
Select Pre-Shared Key to use a pre-shared key for authentication, and type in your pre-
shared key. A pre-shared key identifies a communicating party during a phase 1 IKE
negotiation. It is called "pre-shared" because you have to share it with another party
before you can communicate with them over a secure connection.
Select Certificate (X.509) to use a certificate for authentication.
during a phase 1 IKE negotiation.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9",
"A-F") characters. You must precede a hexadecimal key with a "0x” (zero x), which is not
counted as part of the 16 to 62 character range for the key. For example, in
"0x0123456789ABCDEF", “0x” denotes that the key is hexadecimal and
“0123456789ABCDEF” is the key itself.
224
Select E-mail to identify this Device by an e-mail address.
Select DNS to identify this Device by a domain name.
Select ASN1DN (Abstract Syntax Notation one - Distinguished Name) to this Device by
the subject field in a certificate. This is used only with certificate-based authentication.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Table 104 Security > IPSec VPN: Add/Edit
LABELDESCRIPTION
Local ID ContentWhen you select IP in the Local ID Type field, type the IP address of your computer in
this field. If you configure this field to 0.0.0.0 or leave it blank, the Device automatically
uses the Pre-Shared Key (refer to the Pre-Shared Key field description).
It is recommended that you type an IP address other than 0.0.0.0 in this field or use the
DNS or E-mail type in the following situations.
• When there is a NAT router between the two IPSec routers.
• When you want th e remote IPSec router to be able to distinguish between VPN
connection requests that come in from IPSec route rs with dynami c W AN IP addresses .
When you select DNS or E-mail in the Local ID Type field, type a domain name or email address by which to identify this Device in this field. Use up to 31 ASCII characters
including spaces, although trailing spaces are truncated. The domain name or e-mail
address is for identification purposes only and can be any string.
Remote ID TypeSelect IP to identify the remote IPSec router by its IP address.
Select E-mail to identify the remote IPSec router by an e-mail address.
Select DNS to identify the remote IPSec router by a domain name.
Select ASN1DN to identify the remote IPSec router by the subject field in a certificate.
This is used only with certificate-based authentication.
Remote ID
Content
The configuration of the remote content depends on the remote ID type.
For IP, type the IP address of the computer with which you will make the VPN connection.
If you configure this field to 0.0.0.0 or leave it blank, the Device will use the address in
the Remote IPSec Gateway Address field (refer to the Remote IPSec Gateway Address field description).
For DNS or E-mail, type a domain name or e-mail address by which to identify the
remote IPSec router. Use up to 31 ASCII characters including spaces, although trailing
spaces are truncated. The domain name or e-mail address is for identification purposes
only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the DNS or E-mail ID type in the following situations:
• When there is a NAT router between the two IPSec routers.
• When you want the Device to distinguish between VPN connection requests that come
in from remote IPSec routers with dynamic WAN IP addresses.
Advanced IKE
Settings
NAT_TraversalSelect Enable
Phase 1
ModeSelect the negotiation mode to use to negotiate the IKE SA. Choices are:
Click more to display advanced settings. Click less to display basic settings only.
vic
e and remote IPSec router . The remote IPSec router must also enable NAT tr aversal,
De
and the NAT routers have to forward UDP port 500 packets to the remote IPSec router
behind the NAT router. Otherwise, select Disable.
Main - this encrypts the Device’s and remote IPSec router’s identities but takes more
time to establish the IKE SA.
Aggressive - this is faster but does not encrypt the identities.
The Device and the remote IPSec router must use the same negotiation mode.
if you want to set up a VPN tunnel when th ere are NA T routers betwe en the
VMG8324-B10A / VMG8324-B30A Series User’s Guide
225
Chapter 20 VPN
Table 104 Security > IPSec VPN: Add/Edit
LABELDESCRIPTION
Encryption
Algorithm
Integrity
Algorithm
Select DiffieHellman Group
for Key Exchange
Key Life TimeDefine the length of time before an IPSec SA automatically renegotiates in this field.
Select which key size and encryption algorithm to use in the IKE SA. Choices are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algo rithm
AES - 128 - a 128-bit key with the AES encryption algorithm
AES - 196 - a 196-bit key with the AES encryption algorithm
AES - 256 - a 256-bit key with the AES encryption algorithm
The Device and the remote IPSec router must use the same key size and encryption
algorithm. Longer keys require more processing power, resulting in increased latency and
decreased throughput.
Select which hash algorithm to use to authenticate packet data. Choices are MD5, SHA1. SHA is generally considered stronger than MD5, but it is also slower.
Select which Diffie-Hellman key group you want to use for encryption keys. Choices for
number of bits in the random number are: 768, 1024, 1536, 2048, 3072, 4096.
The longer the key, the more secure the encryption, but also the long er it takes to encrypt
and decrypt information. Both routers must use the same DH key group.
Phase 2
Encryption
Algorithm
Integrity
Algorithm
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates, all
users accessing remote resources are temporarily disconnected.
Select which key size and encryption algorithm to use in the IKE SA. Choices are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algo rithm
AES - 128 - a 128-bit key with the AES encryption algorithm
AES - 192 - a 196-bit key with the AES encryption algorithm
AES - 256 - a 256-bit key with the AES encryption algorithm
Select ESP_NULL to set up a tunnel without encryption. When you select ESP_NULL,
you do not enter an encryption key.
The Device and the remote IPSec router must use the same key size and encryption
algorithm. Longer keys require more processing power, resulting in increased latency and
decreased throughput.
Select which hash algorithm to use to authenticate packet data. Choices are MD5 and
SHA1. SHA is generally considered stronger than MD5, but it is also slower.
226
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Table 104 Security > IPSec VPN: Add/Edit
LABELDESCRIPTION
Perfect Forward
Secrecy (PFS)
Key Life TimeDefine the length of time before an IPSec SA automatically renegotiates in this field.
The following fields are available if you select Manual in the Key Exchange Method field.
Encryption
Algorithm
Encryption
Key
Authentication
Algorithm
Authentication
Key
Select whether or not you want to enable Perfect Forward Secrecy (PFS)
PFS changes the root key that is used to generate encryption keys for each IPSec SA. The
longer the key, the more secure the encryption, but also the longer it takes t o encrypt and
decrypt information. Both routers must use the same DH key group. Choices are:
None - do not use any random number.
768bit(DH Group1) - use a 768-bit random number
1024bit(DH Group2) - use a 1024-bit random number
1536bit(DH Group5) - use a 1536-bit random number
2048bit(DH Group14) - use a 2048-bit random number
3072bit(DH Group15) - use a 3072-bit random number
4096bit(DH Group16) - use a 4096-bit random number
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates, all
users accessing remote resources are temporarily disconnected.
Select which key size and encryption algorithm to use in the IKE SA. Choices are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algo rithm
EPS_NULL - no encryption key or algorithm
This field is applicable when you select an Encryption Algorithm.
Enter the encryption key, which depends on the encryption algorithm.
DES - type a unique key 16 hexadecimal characters long
3DES - type a unique key 48 hexadecimal characters long
Select which hash algorithm to use to authenticate packet data. Choices are MD5, SHA1.
SHA is generally considered stronger than MD5, but it is also slower.
Enter the authentication key, which depends on the authentication algorithm.
MD5 - type a unique key 32 hexadecimal characters long
SHA1 - type a unique key 40 hexadecimal characters long
SPIType a unique SPI (Security Parameter Index) in hexadecimal characters.
The SPI is used to identify the Device during authentication.
The Device and remote IPSec router must use the same SPI.
OKClick OK to save your changes.
CancelClick Cancel to restore your previously saved settings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
227
Chapter 20 VPN
20.4 The IPSec VPN Monitor Screen
Use this screen to check your VPN tunnel’s current status. You can also manually trigger a VPN
tunnel to the remote network. Click Security > IPSec VPN > Monitor to open this screen as
shown next.
Figure 138 Security > IPSec VPN > Monitor
This screen contains the following fields:
Table 105 Security > IPSec VPN > Monitor
LABELDESCRIPTION
Refresh IntervalSelect how often you want the Device to update this screen. Select No Refresh to have
the Device stop updating the screen.
StatusThis displays a green line between two hosts if the VPN tunnel has been established
Connection NameThis displays the name of the VPN policy.
Remote GatewayThis is the IP address of the remote IPSec router in the IKE SA.
Local AddressesThis displays the IP address(es) on the LAN behind your Device.
Remote
Addresses
ActionClick Trigger to establish a VPN connection with the remote network.
successfully. Otherwise, it displays a red line in between.
This displays the IP address(es) on the LAN behind the remote IPSec router.
20.5 Technical Reference
This section provides some technical background information about the topics covered in this
section.
20.5.1 IPSec Architecture
The overall IPSec architecture is shown as follows.
228
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Figure 139 IPSec Architecture
IPSec Algorithms
Chapter 20 VPN
The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header)
protocol (RFC 2402) describe the packet formats and the default standards for packet structure
(including implementation algorithms).
The Encryption Algorithm describes the use of encryption techniques such as DES (Data Encryption
Standard) and Triple DES algorithms.
The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an
authentication mechanism for the AH and ESP protocols.
Key Management
Key management allows you to determine whether to use IKE (ISAKMP) or manual key
configuration in order to set up a VPN.
20.5.2 Encapsulation
The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. A t the time of
writing, the Device supports Tunnel mode only.
Figure 140 Transport and Tunnel Mode IPSec Encapsulation
VMG8324-B10A / VMG8324-B30A Series User’s Guide
229
Chapter 20 VPN
T ransport Mode
Transport mode is used to protect upper layer protocols and only affects the data in the IP packet.
In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the
original IP header and options, but before any upper layer protocols contained in the packet (such
as TCP and UDP).
With ESP, protection is applied only to the upper layer protocols contained in the packet. The IP
header information and options are not used in the authentication process. Therefore, the
originating IP address cannot be verified for integrity against the data.
With the use of AH as the security protocol, protection is extended forward into the IP header to
verify the integrity of the entire packet by use of portions of the original IP header in the hashing
process.
Tunnel Mode
Tunnel mode encapsulates the entire IP packet to transmit it securely. A Tunnel mode is required
for gateway services to provide access to internal systems. Tunnel mode is fundamentally an IP
tunnel with authentication and encryption. This is the most common mode of operation. Tunnel
mode is required for gateway to gateway and host to gateway communications. Tunnel mode
communications have two sets of IP headers:
• Outside header: The outside IP header contains the destination IP address of the VPN gateway.
• Inside header: The inside IP header contains the destination IP address of the final system
behind the VPN gateway. The security protocol appears after the outer IP header and before the
inside IP header.
20.5.3 IKE Phases
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication)
and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses
that SA to negotiate SAs for IPSec.
230
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Figure 141 Two Phases to Set Up the IPSec SA
In phase 1 you must:
Chapter 20 VPN
• Choose a negotiation mode.
• Authenticate the connection by entering a pre-shared key.
• Choose an encryption algorithm.
• Choose an authentication algorithm.
• Choose a Diffie-Hellman public-key cryptography key group.
• Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should stay up
before it times out. An IKE SA times out when the IKE SA lifetime period expires. If an IKE SA
times out when an IPSec SA is already established, the IPSec SA stays connected.
In phase 2 you must:
• Choose an encryption algorithm.
• Choose an authentication algorithm
• Choose a Diffie-Hellman public-key cryptography key group.
• Set the IPSec SA lifetime. This field allows you to determine how long the IPSec SA should stay
up before it times out. The Device automatically renegotiates the IPSec SA if there is traffic when
the IPSec SA lifetime period expires. If an IPSec SA times out, then the IPSec router must
renegotiate the SA the next time someone attempts to send traffic.
20.5.4 Negotiation Mode
The phase 1 Negotiation Mode you select determines how the Security Association (SA) will be
established for each connection through IKE negotiations.
• Main Mode ensures the highest level of security when the communicating parties are
negotiating authentication (phase 1). It uses 6 messages in three round trips: SA negotiation,
Diffie-Hellman exchange and an exchange of nonces (a nonce is a random number). This mode
features identity protection (your identity is not revealed in the negotiation).
VMG8324-B10A / VMG8324-B30A Series User’s Guide
231
Chapter 20 VPN
• Aggressive Mode is quicker than Main Mode because it eliminates several steps when the
communicating parties are negotiating authentication (phase 1). However the trade-off is that
faster speed limits its negotiating power and it also does not provide identity protection. It is
useful in remote access situations where the address of the initiator is not know by the responder
and both parties want to use pre-shared key authentication.
20.5.5 IPSec and NAT
Read this section if you are running IPSec on a host computer behind the Device.
NAT is incompatible with the AH protocol in both Transport and Tunnel mode. An IPSec VPN using
the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash
value appended to the packet. When using AH protocol, packet contents (the data payload) are not
encrypted.
A NAT device in between the IPSec endpoints will rewrite either the source or destination address
with one of its own choosing. The VPN device at the receiving end will verify the integrity of the
incoming packet by computing its own hash value, and complain that the hash value appended to
the received packet doesn't match. The VPN device at the receiving end doesn't know about the
NAT in the middle, so it assumes that the data has been maliciously altered.
IPSec using ESP in Tunnel mode encapsulates the entire original packet (including headers) in a
new IP packet. The new IP packet's source address is the outbound address of the sending VPN
gateway , and its destination address is the inbound address of the VPN device at the receiving end.
When using ESP protocol with authentication, the packet contents (in this case, the entire original
packet) are encrypted. The encrypted contents, but not the new headers, are signed with a hash
value appended to the packet.
Tunnel mode ESP with authentication is compatible with NAT because integrity checks are
performed over the combination of the "original header plus original payload," which is unchanged
by a NAT device.
Transport mode ESP with authentication is not compatible with NAT.
Table 106 VPN and NAT
SECURITY PROTOCOLMODENAT
AHTransportN
AHTunnelN
ESPTransportN
ESPTunnelY
20.5.6 VPN, NAT, and NAT Traversal
NAT is incompatible with the AH protocol in both transport and tunnel mode. An IPSec VPN using
the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash
value appended to the packet, but a NAT device between the IPSec endpoints rewrites the source or
destination address. As a result, the VPN device at the receiving end finds a mismatch between the
hash value and the data and assumes that the data has been maliciously altered.
NAT is not normally compatible with ESP in transport mode either, but the Device’s NAT Traversal
feature provides a way to handle this. NA T tr a versal allows y ou to set up an IKE SA when there are
NAT router s be tw ee n the two IPS ec route r s.
232
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
A
B
Figure 142 NAT Router Between IPSec Routers
Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because
the NAT router changes the header of the IPSec packet. NA T traversal solves the problem by adding
a UDP port 500 header to the IPSec packet. The NAT router forwards the IPSec packet with the UDP
port 500 header unchanged. In the above figure, when IPSec router A tries to establish an IKE SA,
IPSec router B checks the UDP port 500 header, and IPSec routers A and B build the IKE SA.
For NAT traversal to work, you must:
• Use ESP security protocol (in either transport or tunnel mode).
•Use IKE keying mode.
• Enable NAT traversal on both IPSec endpoints.
• Set the NAT router to forward UDP port 500 to IPSec router A.
Finally , NA T is compatible with ESP in tunnel mode because integrity checks are performed ov er the
combination of the "original header plus original payload," which is unchanged by a NAT device. The
compatibility of AH and ESP with NAT in tunnel and transport modes is summarized in the following
table.
Table 107 VPN and NAT
SECURITY PROTOCOLMODENAT
AHTransportN
AHTunnelN
ESPTransportY*
ESPTunnelY
Y* - This is supported in the Device if you enable NAT traversal.
20.5.7 ID Type and Content
With aggressive negotiation mode (see Section 20.5.4 on page 231), the Device identifies incoming
SAs by ID type and content since this identifying information is not encrypted. This enables the
Device to distinguish between multiple rules for SAs that connect from remote IPSec routers that
have dynamic WAN IP addresses.
Regardless of the ID type and content configuration, the Device does not allow you to save multiple
active rules with overlapping local and remote IP addresses.
With main mode (see Section 20.5.4 on page 231), the ID type and content are encrypted to
provide identity protection. In this case the Device can only distinguish between up to 12 different
incoming SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. The
Device can distinguish up to 48 incoming SAs because you can select between three encryption
algorithms (DES, 3DES and AES), two authentication algorithms (MD5 and SHA1) and eight key
groups when you configure a VPN rule (see Section 20.2 on page 221). The ID type and content act
as an extra level of identification for incoming SAs.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
233
Chapter 20 VPN
The type of ID can be a domain name, an IP address or an e-mail address. The content is the IP
address, domain name, or e-mail address.
Table 108 Local ID Type and Content Fields
LOCAL ID TYPE= CONTENT=
IPType the IP address of your computer.
DNSType a domain name (up to 31 characters) by which to identify this Device.
E-mailType an e-mail address (up to 31 characters) by which to identify this Device.
The domain name or e-mail address that you use in the Local IDContent field is used
for identification purposes only and does not need to be a real domain name or e-mail
address.
20.5.7.1 ID Type and Content Examples
Two IPSec routers must have matching ID type and content configuration in order to set up a VPN
tunnel.
The two Devices in this example can complete negotiation and establish a VPN tunnel.
Table 109 Matching ID Type and Content Configuration Example
Device ADevice B
Local ID type: E-mailLoc al ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Remote ID type: IPRemote ID type: E-mail
Remote ID content: 1.1.1.2Remote ID content: tom@yourcompany.com
The two Devices in this example cannot complete their negotiation because Device B’s Local ID Type is IP, but Device A’s Remote ID Type is set to E-mail. An “ID mismatched” message
displays in the IPSEC LOG.
Table 110 Mismatching ID Type and Content Configuration Example
DEVICE ADEVICE B
Local ID type: IPLocal ID type: IP
Local ID content: 1.1.1.10Local ID content: 1.1.1.2
Remote ID ty pe: E-mailRemote ID type: IP
Remote ID content: aa@yahoo.comRemote ID content: 1.1.1.0
20.5.8 Pre-Shared Key
A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section
20.5.3 on page 230 for more on IKE phases). It is called “pre-shared” because you have to share it
with another party before you can communicate with them over a secure connection.
20.5.9 Diffie-Hellman (DH) Key Groups
Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a
shared secret over an unsecured communications channel. Diffie-Hellman is used within IKE SA
setup to establish session keys. Upon completion of the Diffie-Hellman exchange, the two peers
have a shared secret, but the IKE SA is not authenticated. For authentication, use pre-shared keys.
234
VMG8324-B10A / VMG8324-B30A Series User’s Guide
CHAPTER 21
21.1 Overview
Use this chapter to:
• Connect an analog phone to the Device.
• Make phone calls over the Internet, as well as the regular phone network.
• Configure settings such as speed dial.
• Configure network settings to optimize the voice quality of your phone calls.
21.1.1 What You Can Do in this Chapter
These screens allow you to configure your Device to make phone calls over the Internet and your
regular phone line, and to set up the phones you connect to the Device.
Voice
•Use the SIP Account screen (Section 21.3 on page 236) to set up information about your SIP
account, control which SIP accounts the phones connected to the Device use and configure audio
settings such as volume levels for the phones connected to the Device.
•Use the SIP Service Provider screen (Section 21.4 on page 241) to configure the SIP server
information, QoS for VoIP calls, the numbers for certain phone functions, and dialing plan.
•Use the PhoneRegion screen (Section 21.5 on page 249) to change settings that depend on the
country you are in.
•Use the Call Rule screen (Section 21.6 on page 249) to set up shortcuts for dialing frequentlyused (VoIP) phone numbers.
•Use the Call History Summary screen (Section 21.7 on page 250) to view the summary list of
received, dialed and missed calls.
•Use the Call History Outgoing screen (Section 21.8 on page 251) to view detailed information
for each outgoing call you made.
•Use the Call History Incoming screen (Section 21.9 on page 251) to view detailed information
for each incoming call from someone calling you.
You don’t necessarily need to use all these screens to set up your account. In fact, if your service
provider did not supply information on a particular field in a screen, it is usually best to leave it at
its default setting.
VMG8324-B10A / VMG8324-B30A Series User’s Guide235
Chapter 21 Voice
21.1.2 What You Need to Know About VoIP
VoIP
VoIP stands for Voice over IP. IP is the Internet Protocol, which is the message-carrying standard
the Internet runs on. So, Voice over IP is the sending of voice signals (speech) over the Internet (or
another network that uses the Internet Protocol).
SIP
SIP stands for Session Initiation Protocol. SIP is a signalling standard that lets one network device
(like a computer or the Device) send messages to another. In VoIP, these messages are about
phone calls over the network. For example, when you dial a number on your Device, it sends a SIP
message over the network asking the other device (the number you dialed) to take part in the call.
SIP Accounts
A SIP account is a type of VoIP account. It is an arrangement with a service provider that lets you
make phone calls over the Internet. When you set the Device to use your SIP account to make
calls, the Device is able to send all the information about the phone call to your service provider on
the Internet.
Strictly speaking, you don’t need a SIP account. It is possible for one SIP device (like the Device) to
call another without involving a SIP service provider. However, the networking difficulties involved
in doing this make it tremendously impractical under normal circumstances. Your SIP account
provider removes these difficulties by taking care of the call routing and setup - figuring out how to
get your call to the right place in a way that you and the other person can talk to one another.
How to Find Out More
See Chapter 4 on page 37 for a tutorial showing how to set up these screens in an example
scenario.
See Section 21.10 on page 252 for advanced technical information on SIP.
21.2 Before You Begin
• Before you can use these screens, you need to have a VoIP account already set up. If you don’t
have one yet, you can sign up with a VoIP service provider over the Internet.
• You should have the information your VoIP service provider gave you ready, before you start to
configure the Device.
21.3 The SIP Account Screen
The Device uses a SIP account to make outgoing VoIP calls and check if an incoming call’s
destination number matches your SIP account’s SIP number. In order to make or receive a VoIP
236
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Loading...
+ 176 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.