Product Manual
Page 3
... Ethernet adapter Internet Explorer version 6.0 or Netscape Navigator version 6.0 and above items are missing, please contact your reseller. If any of Package: D-Link AirPlus Xtreme G DI-824VUP High-Speed Enhanced 2.4GHz Wireless VPN Router Power Adapter - 5V DC / 2.5A Manual on CD Quick Installation Guide Note: Using a power supply with a different voltage rating than...
... Ethernet adapter Internet Explorer version 6.0 or Netscape Navigator version 6.0 and above items are missing, please contact your reseller. If any of Package: D-Link AirPlus Xtreme G DI-824VUP High-Speed Enhanced 2.4GHz Wireless VPN Router Power Adapter - 5V DC / 2.5A Manual on CD Quick Installation Guide Note: Using a power supply with a different voltage rating than...
Product Manual
Page 5
...original factory default settings. Connects multiple computers to an Ethernet Broadband (Cable or DSL) modem to share the Internet connection Supports VPN pass-through, providing added security Advanced Firewall features for added network security DHCP server support enables all networked computers to accomodate ...and LAN ports auto detect cable types (straight-through or cross-over ) UPnP supported Note: Please refer to the Resetting the DI-824VUP to the Factory Defualt Settings section in this manual for Management Access Control to manage users on how to your local printer. ...
...original factory default settings. Connects multiple computers to an Ethernet Broadband (Cable or DSL) modem to share the Internet connection Supports VPN pass-through, providing added security Advanced Firewall features for added network security DHCP server support enables all networked computers to accomodate ...and LAN ports auto detect cable types (straight-through or cross-over ) UPnP supported Note: Please refer to the Resetting the DI-824VUP to the Factory Defualt Settings section in this manual for Management Access Control to manage users on how to your local printer. ...
Product Manual
Page 23
...gateways will perform automatic Internet key exchange. However, IKE approach will only need to remote VPN gateways. For more in depth configuration to enable VPN tunnels. IPSec VPN supports two kinds of allowable tunnels. The tunnel technology supports data confidentiality, data origin,.... Tunnel Name Method More Create a name for the tunnel. Using the Configuration Menu Home > VPN Settings VPN Settings are settings that the two endpoint VPN gateways require setting up authentication and encryption key by utilizing encapsulation protocols, encryption algorithms, and hashing ...
...gateways will perform automatic Internet key exchange. However, IKE approach will only need to remote VPN gateways. For more in depth configuration to enable VPN tunnels. IPSec VPN supports two kinds of allowable tunnels. The tunnel technology supports data confidentiality, data origin,.... Tunnel Name Method More Create a name for the tunnel. Using the Configuration Menu Home > VPN Settings VPN Settings are settings that the two endpoint VPN gateways require setting up authentication and encryption key by utilizing encapsulation protocols, encryption algorithms, and hashing ...
Product Manual
Page 24
...network. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Remote Subnet Remote Netmask The subnet of the remote VPN gateway's Local Network. IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of ...IPSec proposals for the Local Network of remote VPN gateway. IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals...
...network. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Remote Subnet Remote Netmask The subnet of the remote VPN gateway's Local Network. IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of ...IPSec proposals for the Local Network of remote VPN gateway. IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals...
Product Manual
Page 25
Auth algorithm There are two algorithms that can be selected: 3DES and DES. Proposal Name This is the name used to classify the IKE proposal. Encrypt algorithm There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). DH Group There are three groups that can be selected: SHA1 and MD5. 25 Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below.
Auth algorithm There are two algorithms that can be selected: 3DES and DES. Proposal Name This is the name used to classify the IKE proposal. Encrypt algorithm There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). DH Group There are three groups that can be selected: SHA1 and MD5. 25 Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below.
Product Manual
Page 26
Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... There are two units that can be selected: second and KB. Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. The identifier of IKE proposal can be chosen for adding the corresponding proposal to IKE Proposal index list. 26 Life Time Life Time Unit Proposal ID Add to Enter in the life time value.
Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued... There are two units that can be selected: second and KB. Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. The identifier of IKE proposal can be chosen for adding the corresponding proposal to IKE Proposal index list. 26 Life Time Life Time Unit Proposal ID Add to Enter in the life time value.
Product Manual
Page 27
Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal index Proposal Name DH Group Encap protocol A list of selected proposal indexes from the IPSec proposal ...
Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal index Proposal Name DH Group Encap protocol A list of selected proposal indexes from the IPSec proposal ...
Product Manual
Page 28
There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the corresponding proposal to the dedicated tunnel. Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Click it to add the chosen proposal indicated by proposal ID to Enter in a life time value. Life Time Life Time Unit Proposal ID Add to IPSec Proposal index list. 28
There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the corresponding proposal to the dedicated tunnel. Using the Configuration Menu Home > VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Click it to add the chosen proposal indicated by proposal ID to Enter in a life time value. Life Time Life Time Unit Proposal ID Add to IPSec Proposal index list. 28
Product Manual
Page 29
... the device will have less security. Enter the Subnet Mask for the Local Network of the remote VPN gateway's local network. The value of rules applied when connecting to the VPN gateway. Remote Subnet Remote Netmask Remote Gateway Method Local SPI Remote SPI The subnet of the router...the remote SPI should be a host, a partial subnet, or a whole subnet. The WAN IP address of the remote VPN gateway's Local Network. Using the Configuration Menu Home > VPN Settings > Tunnel > Manual Tunnel Name Aggressive Mode Local Subnet Local Netmask Current tunnel name. The value of the local SPI...
... the device will have less security. Enter the Subnet Mask for the Local Network of the remote VPN gateway's local network. The value of rules applied when connecting to the VPN gateway. Remote Subnet Remote Netmask Remote Gateway Method Local SPI Remote SPI The subnet of the router...the remote SPI should be a host, a partial subnet, or a whole subnet. The WAN IP address of the remote VPN gateway's Local Network. Using the Configuration Menu Home > VPN Settings > Tunnel > Manual Tunnel Name Aggressive Mode Local Subnet Local Netmask Current tunnel name. The value of the local SPI...
Product Manual
Page 30
... be selected: 3DES and DES. Life Time Unit There are two algorithms that can be selected: Second and KB. 30 Using the Configuration Menu Home > VPN Settings > Tunnel > Manual Continued... Enter in the life time value. For 3DES, the encryption key is 20 bytes.(40 Char.). For SHA1, the authentication algorithm...
... be selected: 3DES and DES. Life Time Unit There are two algorithms that can be selected: Second and KB. 30 Using the Configuration Menu Home > VPN Settings > Tunnel > Manual Continued... Enter in the life time value. For 3DES, the encryption key is 20 bytes.(40 Char.). For SHA1, the authentication algorithm...
Product Manual
Page 31
..., remote subnet, remote netmask, remote gateway, and pre-shared key. Basic setup includes the setting of the VPN gateway's local network. The netmask of IKE proposals. IKE Tunnel Name Dynamic VPN Aggressive Mode Local Subnet Local Netmask There are three parts that are necessary to know the IP address of... VPN setting. IKE proposal setup includes the setting of a set of the VPN gateway's local network. 31 The tunnel name is derived from the set of frequent-used IKE proposals and ...
..., remote subnet, remote netmask, remote gateway, and pre-shared key. Basic setup includes the setting of the VPN gateway's local network. The netmask of IKE proposals. IKE Tunnel Name Dynamic VPN Aggressive Mode Local Subnet Local Netmask There are three parts that are necessary to know the IP address of... VPN setting. IKE proposal setup includes the setting of a set of the VPN gateway's local network. 31 The tunnel name is derived from the set of frequent-used IKE proposals and ...
Product Manual
Page 32
Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel Continued... Preshared Key The first key that supports IKE mechanism of IPSec proposals for the dedicated tunnel. 32 IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of both endpoint gateways. IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of IKE proposals for negotiating further security keys. The preshared key must be the same for both VPN gateways for the dedicated tunnel.
Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel Continued... Preshared Key The first key that supports IKE mechanism of IPSec proposals for the dedicated tunnel. 32 IPSec Proposal index Click the button to setup a set of frequent-used IPSec proposals and select from the set of both endpoint gateways. IKE Proposal index Click the button to setup a set of frequent-used IKE proposals and select from the set of IKE proposals for negotiating further security keys. The preshared key must be the same for both VPN gateways for the dedicated tunnel.
Product Manual
Page 33
Encrypt algorithm There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Auth algorithm There are three groups that can be focused. DH Group There are two algorithms that can be selected: SHA1 and MD5. 33 Proposal Name It indicates which IKE proposal to be selected: 3DES and DES. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below.
Encrypt algorithm There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), and group 5 (MODP1536). Auth algorithm There are three groups that can be focused. DH Group There are two algorithms that can be selected: SHA1 and MD5. 33 Proposal Name It indicates which IKE proposal to be selected: 3DES and DES. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below.
Product Manual
Page 34
Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... There are two units that can be selected: second and KB. The identifier of IKE proposal can be chosen for adding the corresponding proposal to the dedicated tunnel. Life Time Life Time Unit Proposal ID Add to IKE Proposal index list. 34 Click it to add the chosen proposal indicated by proposal ID to Enter in the life time value.
Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... There are two units that can be selected: second and KB. The identifier of IKE proposal can be chosen for adding the corresponding proposal to the dedicated tunnel. Life Time Life Time Unit Proposal ID Add to IKE Proposal index list. 34 Click it to add the chosen proposal indicated by proposal ID to Enter in the life time value.
Product Manual
Page 35
... protocols that can be selected: 3DES and DES. There are two algorithms that can be selected: ESP and AH. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index Proposal Name A list of selected proposal indexes from the IPSec proposal pool listed below. This is the...
... protocols that can be selected: 3DES and DES. There are two algorithms that can be selected: ESP and AH. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index Proposal Name A list of selected proposal indexes from the IPSec proposal pool listed below. This is the...
Product Manual
Page 36
Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the corresponding proposal to IPSec Proposal index list. 36 Life Time Life Time Unit Proposal ID Add to Enter in a life time value. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued...
Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the corresponding proposal to IPSec Proposal index list. 36 Life Time Life Time Unit Proposal ID Add to Enter in a life time value. Using the Configuration Menu Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued...
Product Manual
Page 37
Enter in the username for the L2TP account. 37 Select one of L2TP Server Authentication Protocol Tunnel Name User Name Password Click to access the L2TP server. Enter in the password for the L2TP account. Enter your Virtual IP address to enable the L2TP Server function. Current tunnel name. Using the Configuration Menu Home > VPN Settings > L2TP Server Setting Enable L2TP Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP.
Enter in the username for the L2TP account. 37 Select one of L2TP Server Authentication Protocol Tunnel Name User Name Password Click to access the L2TP server. Enter in the password for the L2TP account. Enter your Virtual IP address to enable the L2TP Server function. Current tunnel name. Using the Configuration Menu Home > VPN Settings > L2TP Server Setting Enable L2TP Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP.
Product Manual
Page 38
Select one of PPTP Server Authentication Protocol Tunnel Name User Name Password Click to access the PPTP server. Enter in the username for the PPTP account. 38 Enter in the password for the PPTP account. Current tunnel name. Using the Configuration Menu Home > VPN Settings > PPTP Server Setting Enable PPTP Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Enter your Virtual IP address to enable the PPTP Server function.
Select one of PPTP Server Authentication Protocol Tunnel Name User Name Password Click to access the PPTP server. Enter in the username for the PPTP account. 38 Enter in the password for the PPTP account. Current tunnel name. Using the Configuration Menu Home > VPN Settings > PPTP Server Setting Enable PPTP Server Virtual IP of the following authentication protocols: PAP, CHAP, or MSCHAP. Enter your Virtual IP address to enable the PPTP Server function.
Product Manual
Page 49
...of hops equals the number of the specified network that data must pass through the internet. Dynamic Routing Dynamic Routing Settings allow the VPN Router to route IP packets to the specified network. The RIP protocol is set to take to another network automatically. Enter in...Next Hop Fowarding, and Subnetmask Exchange. RIP v1 Protocol in the subnet mask to the WAN (Internet) network. In a transmission path, each link is routed through before reaching the destination. 49 Using the Configuration Menu Advanced > Routing Static routes can be used for the specified static route...
...of hops equals the number of the specified network that data must pass through the internet. Dynamic Routing Dynamic Routing Settings allow the VPN Router to route IP packets to the specified network. The RIP protocol is set to take to another network automatically. Enter in...Next Hop Fowarding, and Subnetmask Exchange. RIP v1 Protocol in the subnet mask to the WAN (Internet) network. In a transmission path, each link is routed through before reaching the destination. 49 Using the Configuration Menu Advanced > Routing Static routes can be used for the specified static route...
Product Manual
Page 58
... using the standard port 21, then enter in the port number that provides compatibility among networking equipment, software, and peripherals. The device supports VPN (Virtual Private Network) pass-through is enabled, there is no need to -Point Tunneling Protocol) and IPSec (IP Security). Using the Configuration... is short for both PPTP (Point-to open up virtual services. Once VPN pass-through for Universal Plug and Play which is a networking architecture that the FTP server is using instead. 58 The DI-824VUP is a UPnP enabled router and will only work with other UPnP devices/...
... using the standard port 21, then enter in the port number that provides compatibility among networking equipment, software, and peripherals. The device supports VPN (Virtual Private Network) pass-through is enabled, there is no need to -Point Tunneling Protocol) and IPSec (IP Security). Using the Configuration... is short for both PPTP (Point-to open up virtual services. Once VPN pass-through for Universal Plug and Play which is a networking architecture that the FTP server is using instead. 58 The DI-824VUP is a UPnP enabled router and will only work with other UPnP devices/...