Product Manual
Page 3
If any of Package: D-Link DI-808HV Broadband VPN Router 5V DC Power Adapter Ethernet (CAT5-UTP/Straight-Through) Cable Manual on CD Quick Installation Guide Note: Using a power supply with a different voltage rating than the one included with JavaScript enabled 3 System Requirements For Configuration: Ethernet-based Cable or DSL Modem Computer with Windows-, Macintosh-, or...
If any of Package: D-Link DI-808HV Broadband VPN Router 5V DC Power Adapter Ethernet (CAT5-UTP/Straight-Through) Cable Manual on CD Quick Installation Guide Note: Using a power supply with a different voltage rating than the one included with JavaScript enabled 3 System Requirements For Configuration: Ethernet-based Cable or DSL Modem Computer with Windows-, Macintosh-, or...
Product Manual
Page 5
...Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients Firewall Unwanted packets from outside intruders can be blocked to protect your network DHCP server supported All of the networked computers can retrieve TCP/IP settings automatically from the DI-808HV Web-based configuration Configurable through or crossover cable. LAN... multiple computers to a broadband (cable or DSL) modem to surf the Internet Auto-sensing Ethernet Switch Equipped with a 8-port auto-sensing Ethernet switch Hardware VPN Termination Device Supports up analog modem.
...Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients Firewall Unwanted packets from outside intruders can be blocked to protect your network DHCP server supported All of the networked computers can retrieve TCP/IP settings automatically from the DI-808HV Web-based configuration Configurable through or crossover cable. LAN... multiple computers to a broadband (cable or DSL) modem to surf the Internet Auto-sensing Ethernet Switch Equipped with a 8-port auto-sensing Ethernet switch Hardware VPN Termination Device Supports up analog modem.
Product Manual
Page 33
.... Tunnel Name Method More Create a name for the tunnel. Using the Configuration Menu Home >VPN Settings VPN Settings are settings that the two endpoint VPN gateways require setting up authentication and encryption key by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms. VPN NetBIOS broadcast Max. The tunnel technology supports data confidentiality, data origin, authentication...
.... Tunnel Name Method More Create a name for the tunnel. Using the Configuration Menu Home >VPN Settings VPN Settings are settings that the two endpoint VPN gateways require setting up authentication and encryption key by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms. VPN NetBIOS broadcast Max. The tunnel technology supports data confidentiality, data origin, authentication...
Product Manual
Page 34
...mode will accelerate establishing tunnel, but the device will have less security. The subnet of the remote VPN gateway's local network. Remote Netmask Remote Gateway The subnet of the VPN gateway's local network. Local Netmask Remote Subnet Local netmask combined with local subnet to setup a set...The first key that supports IKE mechanism of IKE proposals for the tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method>IKE Tunnel Name Current tunnel name. It can be the same for both VPN gateways for the tunnel. 34 The preshared key must be a host, a partial ...
...mode will accelerate establishing tunnel, but the device will have less security. The subnet of the remote VPN gateway's local network. Remote Netmask Remote Gateway The subnet of the VPN gateway's local network. Local Netmask Remote Subnet Local netmask combined with local subnet to setup a set...The first key that supports IKE mechanism of IKE proposals for the tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method>IKE Tunnel Name Current tunnel name. It can be the same for both VPN gateways for the tunnel. 34 The preshared key must be a host, a partial ...
Product Manual
Page 35
Encrypt algorithm There are two algorithms that can be selected: SHA1 and MD5. 35 Proposal Name This is the name used to classify the IKE proposal. Auth algorithm There are three groups that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. DH Group There are two algorithms that can be selected: 3DES and DES.
Encrypt algorithm There are two algorithms that can be selected: SHA1 and MD5. 35 Proposal Name This is the name used to classify the IKE proposal. Auth algorithm There are three groups that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. DH Group There are two algorithms that can be selected: 3DES and DES.
Product Manual
Page 36
Click it to add the chosen proposal indicated by proposal ID to Enter in the life time value. Life Time Life Time Unit Proposal ID Add to IKE Proposal index list. 36 Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. There are two units that can be selected: second and KB.
Click it to add the chosen proposal indicated by proposal ID to Enter in the life time value. Life Time Life Time Unit Proposal ID Add to IKE Proposal index list. 36 Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. There are two units that can be selected: second and KB.
Product Manual
Page 37
... algorithms that can be selected: 3DES and DES. Auth algorithm There are two algorithms that can be selected: SHA1 and MD5. 37 Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal index Proposal Name DH Group Encap protocol A list of selected proposal indexes from the IPSec...
... algorithms that can be selected: 3DES and DES. Auth algorithm There are two algorithms that can be selected: SHA1 and MD5. 37 Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal index Proposal Name DH Group Encap protocol A list of selected proposal indexes from the IPSec...
Product Manual
Page 38
There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the proposal to IPSec Proposal index list. 38 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Life Time Life Time Unit Proposal ID Add to Enter in a life time value.
There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the proposal to IPSec Proposal index list. 38 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Life Time Life Time Unit Proposal ID Add to Enter in a life time value.
Product Manual
Page 39
...value of the local SPI should be set of the remote VPN gateway's local network. It can be a host, a partial subnet, or a whole subnet. Local netmask ...combined with local subnet to the VPN gateway. Remote SPI The value of remote VPN gateway. The WAN IP address of the remote SPI should be a host, a partial... when connecting to form a subnet domain. The set in hex format. The subnet of the VPN gateway's local network. Aggressive Mode Local Subnet Local Netmask Remote Subnet Remote Netmask Remote Gateway Method ...
...value of the local SPI should be set of the remote VPN gateway's local network. It can be a host, a partial subnet, or a whole subnet. Local netmask ...combined with local subnet to the VPN gateway. Remote SPI The value of remote VPN gateway. The WAN IP address of the remote SPI should be a host, a partial... when connecting to form a subnet domain. The set in hex format. The subnet of the VPN gateway's local network. Aggressive Mode Local Subnet Local Netmask Remote Subnet Remote Netmask Remote Gateway Method ...
Product Manual
Page 40
... bytes (32 Char.). Life Time Enter in the life time value. There are two algorithms that can be selected: 3DES and DES. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... Encapsulation Protocol Encryption Algorithm There are two units that can be selected: ESP and AH. Life Time Unit There are...
... bytes (32 Char.). Life Time Enter in the life time value. There are two algorithms that can be selected: 3DES and DES. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... Encapsulation Protocol Encryption Algorithm There are two units that can be selected: ESP and AH. Life Time Unit There are...
Product Manual
Page 41
...setting of a set of IKE proposals. The subnet of the VPN gateway's local network. 41 Current tunnel name. The netmask of the VPN gateway's local network. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel VPN Settings - IKE Tunnel Name There are three parts that are...tunnel: basic setup, IKE proposal setup, and IPSec proposal setup. Dynamic VPN Aggressive Mode Local Subnet Local Netmask This feature works with a VPN software client so the DI-808HV does not need to setup the configuration of following items: local subnet, local netmask, remote subnet, remote netmask...
...setting of a set of IKE proposals. The subnet of the VPN gateway's local network. 41 Current tunnel name. The netmask of the VPN gateway's local network. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel VPN Settings - IKE Tunnel Name There are three parts that are...tunnel: basic setup, IKE proposal setup, and IPSec proposal setup. Dynamic VPN Aggressive Mode Local Subnet Local Netmask This feature works with a VPN software client so the DI-808HV does not need to setup the configuration of following items: local subnet, local netmask, remote subnet, remote netmask...
Product Manual
Page 42
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel Continued... IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of IKE proposals for the dedicated tunnel. 42 IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals for negotiating further security keys. The preshared key must be the same for both VPN gateways for the dedicated tunnel. Preshared Key The first key that supports IKE mechanism of both endpoint gateways.
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel Continued... IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of IKE proposals for the dedicated tunnel. 42 IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals for negotiating further security keys. The preshared key must be the same for both VPN gateways for the dedicated tunnel. Preshared Key The first key that supports IKE mechanism of both endpoint gateways.
Product Manual
Page 43
Auth algorithm There are three groups that can be selected: SHA1 and MD5. 43 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. DH Group There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Encrypt algorithm There are two algorithms that can be focused. Proposal Name It indicates which IKE proposal to be selected: 3DES and DES.
Auth algorithm There are three groups that can be selected: SHA1 and MD5. 43 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. DH Group There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Encrypt algorithm There are two algorithms that can be focused. Proposal Name It indicates which IKE proposal to be selected: 3DES and DES.
Product Manual
Page 44
Life Time Life Time Unit Proposal ID Add to the dedicated tunnel. There are two units that can be selected: second and KB. The identifier of IKE proposal can be chosen for adding corresponding proposal to Enter in the life time value. Click it to add the chosen proposal indicated by proposal ID to IKE Proposal index list. 44 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued...
Life Time Life Time Unit Proposal ID Add to the dedicated tunnel. There are two units that can be selected: second and KB. The identifier of IKE proposal can be chosen for adding corresponding proposal to Enter in the life time value. Click it to add the chosen proposal indicated by proposal ID to IKE Proposal index list. 44 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued...
Product Manual
Page 45
... that can be selected: ESP and AH. Auth algorithm There are two algorithms that can be selected: SHA1 and MD5. 45 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index Proposal Name A list of selected proposal indexes from the IPSec proposal pool listed below. Encrypt algorithm...
... that can be selected: ESP and AH. Auth algorithm There are two algorithms that can be selected: SHA1 and MD5. 45 Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index Proposal Name A list of selected proposal indexes from the IPSec proposal pool listed below. Encrypt algorithm...
Product Manual
Page 46
The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Life Time Life Time Unit Proposal ID Add to IPSec Proposal index list. 46 Click it to add the chosen proposal indicated by proposal ID to Enter in a life time value. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued... There are two units that can be selected: second and KB.
The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Life Time Life Time Unit Proposal ID Add to IPSec Proposal index list. 46 Click it to add the chosen proposal indicated by proposal ID to Enter in a life time value. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued... There are two units that can be selected: second and KB.
Product Manual
Page 47
Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server Click to access the L2PT server. User Name Enter in the password for the L2TP account. Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Password Enter in the username for the L2TP account. 47 Server Authentication Protocol Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function. Tunnel Name Current tunnel name.
Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server Click to access the L2PT server. User Name Enter in the password for the L2TP account. Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Password Enter in the username for the L2TP account. 47 Server Authentication Protocol Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function. Tunnel Name Current tunnel name.
Product Manual
Page 48
Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Click to access thePPPT server. Password Enter in the username for the PPTP account. 48 Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Tunnel Name Current tunnel name. User Name Enter in the password for the PPTP account. Server Authentication Protocol Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function.
Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Click to access thePPPT server. Password Enter in the username for the PPTP account. 48 Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Tunnel Name Current tunnel name. User Name Enter in the password for the PPTP account. Server Authentication Protocol Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function.
Product Manual
Page 59
RIP v2 Enhanced version of RIP v1with added features such as Authentication, Routing Domain, Next Hop Fowarding, and Subnetmask Exchange. 59 Protocol in which the IP address is applied, and broadcasts the routing information to enable (RIPv1 / RIPv2) protocol. By default, it is set to another network automatically. Using the Configuration Menu Advanced > Routing Dynamic Routing RIP v1 Dynamic Routing Settings allow the VPN Router to route IP packets to disable. The RIP protocol is routed through the internet. Check to other routers on the network regularly.
RIP v2 Enhanced version of RIP v1with added features such as Authentication, Routing Domain, Next Hop Fowarding, and Subnetmask Exchange. 59 Protocol in which the IP address is applied, and broadcasts the routing information to enable (RIPv1 / RIPv2) protocol. By default, it is set to another network automatically. Using the Configuration Menu Advanced > Routing Dynamic Routing RIP v1 Dynamic Routing Settings allow the VPN Router to route IP packets to disable. The RIP protocol is routed through the internet. Check to other routers on the network regularly.
Product Manual
Page 66
... can be made through is enabled, there is using instead. 66 If an FTP server you have many VPN clients on the LAN. Using the Configuration Menu Tools > Misc Continued... If you do not want to access is not using the standard port 21, then enter in the port number that ... short for both PPTP (Point-to open up virtual services. The device supports VPN (Virtual Private Network) pass-through for Universal Plug and Play which is a UPnP enabled router and will only work with other UPnP devices/softwares. The DI-808HV is a networking architecture that the FTP server is no need to -Point...
... can be made through is enabled, there is using instead. 66 If an FTP server you have many VPN clients on the LAN. Using the Configuration Menu Tools > Misc Continued... If you do not want to access is not using the standard port 21, then enter in the port number that ... short for both PPTP (Point-to open up virtual services. The device supports VPN (Virtual Private Network) pass-through for Universal Plug and Play which is a UPnP enabled router and will only work with other UPnP devices/softwares. The DI-808HV is a networking architecture that the FTP server is no need to -Point...