Product Manual
Page 3
Package Contents Contents of the above , with the DI-804HV will cause damage and void the warranty for this product. System Requirements For Configuration: n Ethernet-Based Cable or DSL Modem n Computer with Windows,...an installed Ethernet adapter n Internet Explorer version 6.x or Netscape Navigator version 6.x and above items are missing, please contact your reseller. If any of Package: n D-Link DI-804HV Broadband Hardware VPN Router n Power Adapter - 5V DC n Ethernet (CAT5-UTP/Straight-Through) Cable n Manual on CD n Quick Installation Guide Note: Using a power supply with a different...
Package Contents Contents of the above , with the DI-804HV will cause damage and void the warranty for this product. System Requirements For Configuration: n Ethernet-Based Cable or DSL Modem n Computer with Windows,...an installed Ethernet adapter n Internet Explorer version 6.x or Netscape Navigator version 6.x and above items are missing, please contact your reseller. If any of Package: n D-Link DI-804HV Broadband Hardware VPN Router n Power Adapter - 5V DC n Ethernet (CAT5-UTP/Straight-Through) Cable n Manual on CD n Quick Installation Guide Note: Using a power supply with a different...
Product Manual
Page 4
... (VPN) functionality. The DI-804HV is an ideal way to extend the reach and number of computers connected to your package) you will have the ability to remote corporate networks.. It provides a complete solution for Internet surfing, office resources sharing, and secure access to share information and resources. Introduction The D-Link DI-804HV is a 4-port Broadband Router...
... (VPN) functionality. The DI-804HV is an ideal way to extend the reach and number of computers connected to your package) you will have the ability to remote corporate networks.. It provides a complete solution for Internet surfing, office resources sharing, and secure access to share information and resources. Introduction The D-Link DI-804HV is a 4-port Broadband Router...
Product Manual
Page 5
...router to Ethernetenabled devices. LAN ports provide connections to its original factory default settings. n Broadband modem and IP sharing Connects multiple computers to a broadband (cable or DSL) modem to surf the Internet n Auto-sensing Ethernet Switch Equipped with a 4-port auto-sensing Ethernet switch n Hardware VPN... serial connection for dial-up to 40 VPN Tunnels n VPN Pass-Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients n Firewall Unwanted packets from the DI-804HV n Web-based configuration Configurable through or cross...
...router to Ethernetenabled devices. LAN ports provide connections to its original factory default settings. n Broadband modem and IP sharing Connects multiple computers to a broadband (cable or DSL) modem to surf the Internet n Auto-sensing Ethernet Switch Equipped with a 4-port auto-sensing Ethernet switch n Hardware VPN... serial connection for dial-up to 40 VPN Tunnels n VPN Pass-Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients n Firewall Unwanted packets from the DI-804HV n Web-based configuration Configurable through or cross...
Product Manual
Page 8
... to -network connection across the Internet or a Wide Area Network (WAN). Introduction to Virtual Private Networking Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to -Point Tunneling Protocol (PPTP) PPTP uses proprietary means of connecting two ...the client and server whereas PPTP only encrypts the data packets. For example, an employee can implement its own VPN network making interoperability a challenge. 8 Both of these VPN implementations are several different implementations of a packet. IP Security (IPSec) IPSec provides a more secure network-to ...
... to -network connection across the Internet or a Wide Area Network (WAN). Introduction to Virtual Private Networking Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to -Point Tunneling Protocol (PPTP) PPTP uses proprietary means of connecting two ...the client and server whereas PPTP only encrypts the data packets. For example, an employee can implement its own VPN network making interoperability a challenge. 8 Both of these VPN implementations are several different implementations of a packet. IP Security (IPSec) IPSec provides a more secure network-to ...
Product Manual
Page 29
...private tunnels to adjust manual key or IKE method settings, click More. 29 NetBIOS broadcast- Enable this to enable VPN tunnels. IPSec VPN supports two kinds of network information by the Administrator manually. Admins of both endpoint gateways will perform automatic Internet key... exchange. Create a name for optimal performance. For more in depth configuration to remote VPN gateways. Max. The tunnel technology supports data confidentiality, data origin, authentication and data integrity of key-obtained methods: manual key...
...private tunnels to adjust manual key or IKE method settings, click More. 29 NetBIOS broadcast- Enable this to enable VPN tunnels. IPSec VPN supports two kinds of network information by the Administrator manually. Admins of both endpoint gateways will perform automatic Internet key... exchange. Create a name for optimal performance. For more in depth configuration to remote VPN gateways. Max. The tunnel technology supports data confidentiality, data origin, authentication and data integrity of key-obtained methods: manual key...
Product Manual
Page 30
...Tunnel Name- Local netmask combined with local subnet to setup a set of frequent-used IKE proposals and select from the set of the remote VPN gateway's local network. Remote Gateway- Click the button to setup a set of frequent-used IPSec proposals and select from the set of the... will have less security. Local Netmask- Remote Subnet- The subnet of IKE proposals for the tunnel. 30 The WAN IP address of the remote VPN gateway's local network. IKE Proposal index- Aggressive Mode- Local Subnet- It can be a host, a partial subnet or a whole subnet. The subnet of ...
...Tunnel Name- Local netmask combined with local subnet to setup a set of frequent-used IKE proposals and select from the set of the remote VPN gateway's local network. Remote Gateway- Click the button to setup a set of frequent-used IPSec proposals and select from the set of the... will have less security. Local Netmask- Remote Subnet- The subnet of IKE proposals for the tunnel. 30 The WAN IP address of the remote VPN gateway's local network. IKE Proposal index- Aggressive Mode- Local Subnet- It can be a host, a partial subnet or a whole subnet. The subnet of ...
Product Manual
Page 31
This is the name used to classify the IKE proposal. There are three groups can be selected: 3DES and DES. Encrypt algorithm- There are two algorithms that can be selected: SHA1 and MD5. 31 DH Group- A list of selected proposal indexes from the IKE proposal pool listed below. There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Auth algorithm- Proposal Name- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index-
This is the name used to classify the IKE proposal. There are three groups can be selected: 3DES and DES. Encrypt algorithm- There are two algorithms that can be selected: SHA1 and MD5. 31 DH Group- A list of selected proposal indexes from the IKE proposal pool listed below. There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Auth algorithm- Proposal Name- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index-
Product Manual
Page 32
The identifier of IKE proposal can be chosen for adding corresponding proposal to IKE Proposal index list. 32 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Life TimeLife Time UnitProposal ID- Enter in the life time value. Add to- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... There are two units that can be selected: second and KB.
The identifier of IKE proposal can be chosen for adding corresponding proposal to IKE Proposal index list. 32 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Life TimeLife Time UnitProposal ID- Enter in the life time value. Add to- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... There are two units that can be selected: second and KB.
Product Manual
Page 33
...: 3DES and DES. Auth algorithm- DH Group- There are two algorithms that can be selected: ESP and AH. Encrypt algorithm- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal indexProposal Name- A list of selected proposal indexes from the IPSec proposal pool listed below.
...: 3DES and DES. Auth algorithm- DH Group- There are two algorithms that can be selected: ESP and AH. Encrypt algorithm- Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal indexProposal Name- A list of selected proposal indexes from the IPSec proposal pool listed below.
Product Manual
Page 34
The identifier of IPSec proposal can be chosen for adding the proposal to IPSec Proposal index list. 34 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. Enter in a life time value. Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Add to-
The identifier of IPSec proposal can be chosen for adding the proposal to IPSec Proposal index list. 34 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. Enter in a life time value. Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Add to-
Product Manual
Page 35
...a host, a partial subnet or a whole subnet. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Tunnel Name- Current tunnel name. Local Subnet- The subnet of the remote... VPN gateway's local network. Local netmask combined with local subnet to the VPN gateway. Remote Subnet- The subnet of the VPN gateway's local network. The value of the local SPI should be set of the remote SPI should ...
...a host, a partial subnet or a whole subnet. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Tunnel Name- Current tunnel name. Local Subnet- The subnet of the remote... VPN gateway's local network. Local netmask combined with local subnet to the VPN gateway. Remote Subnet- The subnet of the VPN gateway's local network. The value of the local SPI should be set of the remote SPI should ...
Product Manual
Page 36
....(40 alpha- Enter in the life time value. There are two algorithms that can be selected: Second and KB. 36 Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... Life Time- Encryption Key- There are two units that can be selected: 3DES and DES.
....(40 alpha- Enter in the life time value. There are two algorithms that can be selected: Second and KB. 36 Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... Life Time- Encryption Key- There are two units that can be selected: 3DES and DES.
Product Manual
Page 37
...: local subnet, local netmask, remote subnet, remote netmask, remote gateway, and pre-shared key. Basic setup includes the setting of the VPN gateway's local network. 37 Enabling this mode will accelerate establishing the tunnel, but the device will have less security. Local Netmask- The...frequent-used IKE proposals and selecting from previous page of the remote clients. This feature works with a VPN software client so the DI-804HV does not need to setup the configuration of the VPN gateway's local network. It can be a host, a partial subnet or a whole subnet. Tunnel Name...
...: local subnet, local netmask, remote subnet, remote netmask, remote gateway, and pre-shared key. Basic setup includes the setting of the VPN gateway's local network. 37 Enabling this mode will accelerate establishing the tunnel, but the device will have less security. Local Netmask- The...frequent-used IKE proposals and selecting from previous page of the remote clients. This feature works with a VPN software client so the DI-804HV does not need to setup the configuration of the VPN gateway's local network. It can be a host, a partial subnet or a whole subnet. Tunnel Name...
Product Manual
Page 38
... key that supports IKE mechanism of IKE proposals for negotiating further security keys. IKE Proposal index- The preshared key must be the same for both VPN gateways for the dedicated tunnel. IPSec Proposal index- Preshared Key- Using the Configuration Menu Home...
... key that supports IKE mechanism of IKE proposals for negotiating further security keys. IKE Proposal index- The preshared key must be the same for both VPN gateways for the dedicated tunnel. IPSec Proposal index- Preshared Key- Using the Configuration Menu Home...
Product Manual
Page 39
There are two algorithms that can be selected: 3DES and DES. There are three groups can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Encrypt algorithm- This is the name used to classify the IKE proposal. There are two algorithms that can be selected: SHA1 and MD5. 39 DH Group- Auth algorithm- Proposal Name- A list of selected proposal indexes from the IKE proposal pool listed below. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index-
There are two algorithms that can be selected: 3DES and DES. There are three groups can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Encrypt algorithm- This is the name used to classify the IKE proposal. There are two algorithms that can be selected: SHA1 and MD5. 39 DH Group- Auth algorithm- Proposal Name- A list of selected proposal indexes from the IKE proposal pool listed below. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index-
Product Manual
Page 40
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... Enter in the life time value. The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. Click it to add the chosen proposal indicated by proposal ID to - Add to IKE Proposal index list. 40 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB.
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... Enter in the life time value. The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. Click it to add the chosen proposal indicated by proposal ID to - Add to IKE Proposal index list. 40 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB.
Product Manual
Page 41
... be selected: 3DES and DES. There are three groups that can be selected: SHA1 and MD5. 41 Encap protocol- Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index- Encrypt algorithm- DH Group- A list of selected proposal indexes from the IPSec proposal pool listed below. Proposal...
... be selected: 3DES and DES. There are three groups that can be selected: SHA1 and MD5. 41 Encap protocol- Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index- Encrypt algorithm- DH Group- A list of selected proposal indexes from the IPSec proposal pool listed below. Proposal...
Product Manual
Page 42
Add to IPSec Proposal index list. 42 Enter in a life time value. Click it to add the chosen proposal indicated by proposal ID to - Life TimeLife Time UnitProposal ID- The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. There are two units that can be selected: second and KB. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued...
Add to IPSec Proposal index list. 42 Enter in a life time value. Click it to add the chosen proposal indicated by proposal ID to - Life TimeLife Time UnitProposal ID- The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. There are two units that can be selected: second and KB. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued...
Product Manual
Page 43
Authentication Protocol- Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function. User Name- Enter in the username for the L2TP account. 43 Password- Click to access the L2TP server. Server- Tunnel Name- Enter in the password for the L2TP account. Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Current tunnel name. Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server-
Authentication Protocol- Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function. User Name- Enter in the username for the L2TP account. 43 Password- Click to access the L2TP server. Server- Tunnel Name- Enter in the password for the L2TP account. Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Current tunnel name. Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server-
Product Manual
Page 44
Click to access the PPTP server. Current tunnel name. Enter in the username for the PPTP account. 44 Tunnel Name- Password- Server- Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Server- Enter in the password for the PPTP account. User Name- Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Authentication Protocol- Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function.
Click to access the PPTP server. Current tunnel name. Enter in the username for the PPTP account. 44 Tunnel Name- Password- Server- Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Server- Enter in the password for the PPTP account. User Name- Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Authentication Protocol- Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function.