Question about Computers & Internet

Open Question

Ipsec tunnel configuration on adtran with cryptograms map VPN enabled on vlan1

Posted by on

6 Suggested Answers

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

  • 128 Answers

SOURCE: Nortel Extranet VPN using ESP IPSec

Step 1 Go into the web-based configuration on the router (enter 192.168.0.1 in your web brower). Enter username (admin) and password (blank). Step 2 Click on Advanced at the top and then click on Applications on the left side. Step 3 Check Enable Step 4 Enter a name (i.e. Nortel). Step 5 Enter 500 for Trigger Port (500 - 500). Step 6 Select Both for Trigger Type. Step 7 Enter 500 for Public Port. Step 8 Select Both for Public Type. Step 9 Click Apply and then click on Continue when prompted.

Posted on Feb 16, 2006

  • 196 Answers

SOURCE: Configuring IPSec between a Microsoft Windows 2000 or XP PC and a Linksys VPN Router

Windows XP or Windows 2000 IP Address: 140.111.1.2 ? User ISP provide IP Address, this is only a sample Subnet Mask: 255.255.255.0 BEFVP41 WAN IP Address: 140.111.1.1 ? User ISP provide IP Address, this is only a sample Subnet Mask: 255.255.255.0 LAN IP Address: 192.168.1.1 Subnet Mask: 255.255.255.0 Step-by-Step [Windows 2000/XP] Create IPSec Policy 1. Click the Start button, select Run, and type secpol.msc. in the open field. 2. Right-click IP Security Policies on Local Computer and click Create IP Security Policy. 3. Click the Next button, and then type a name for your policy (for example, ?to_befvp41?). Then, click Next. 4. Deselect the Activate the default response rule check box and then click the Next button. 5. Click the Finish button, making sure the Edit check box is checked. Build 2 Filter Lists: ?WinXP? BEFVP41? and ?BEFVP41? WinXP?. Note: The references in this section to ?WinXP? can easily be exchanged for ?Win2000?, if running Windows 2000. Filter List 1: WinXP? BEFVP41 1. In the new policy properties, deselect the Use Add Wizard check box and then click the Add button to create a new rule. 2. From the IP Filter List tab, click the Add button. 3. Type an appropriate name ?WinXP? BEFVP41? for the filter list, deselect the Use Add Wizard check box, and click the Add button. 4. In the Source address field, select My IP Address. 5. In the Destination address field, select A specific IP Subnet, and fill in the IP Address 192.168.1.0 and Subnet mask 255.255.255.0. 6. If you want to type a description for your filter, click the Description tab. 7. Click the OK button. Then click the OK (for WinXP) or Close (for WIN2000) button on the IP Filter List window. Filter List 2: BEFVP41? WinXP 8. On the IP Filter List tab, click the Add button. 9. Type an appropriate name ?BEFVP41? WinXP? for the filter list, deselect the Use Add Wizard check box, and click the Add button. 10. In the Source address field, select A specific IP Subnet, and fill in the IP Address 192.168.1.0 and Subnet mask 255.255.255.0. 11. In the Destination address field, select My IP Address. 12. If you want to type a description for your filter, click the Description tab. 13. Click the OK button and click the OK (for WinXP) or Close (for Win2000) button on IP Filter List window. Configure Individual Rule of 2 Tunnels Tunnel 1: WinXP? BEFVP41 1. From the IP Filter List tab, click the filter list WinXP? BEFVP41. 2. From the Filter Action tab, click the filter action ?Require Security?, and click the Edit button. 3. verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. 4. Select the Session key perfect forward secrecy (PFS) and remember to check the PFS option on the BEFVP41, and click the OK button. 5. From the Authentication Methods tab, click the Edit button. 6. Change the authentication method to Use this string (preshared key), enter the string ?XYZ12345?, and click the OK button. This new Preshared key will be displayed. Click the OK button to continue. 7. From the Tunnel Setting tab, click The tunnel endpoint is specified by this IP Address radio button and type the WAN IP Address 140.111.1.1 of the BEFVP41. 8. From the Connection Type tab, Select All network connections and click the OK button to finish this rule. Tunnel 2: BEFVP41? WinXP 9. In the new policy properties, deselect the Use Add Wizard check box and click the Add button to create the second IP Filter. 10. From the IP Filter List tab, click the filter list BEFVP41? WinXP. 11. From the Filter Action tab, select the filter action Require Security. 12. From the Authentication Methods tab, click the Edit button. 13. Change the authentication method to Use this string (preshared key), enter the string ?XYZ12345?, and then click the OK button. This new Preshared key will be displayed. Click the OK button to continue. 14. From the Tunnel Setting tab, click the radio button for The tunnel endpoint is specified by this IP Address and type the Windows 2000/XP IP Address 140.111.1.2. 15. From the Connection Type tab, select All network connections. Then, click the OK (for WInXP) or Close (for Win2000) button to finish . 16. From the Rules tab, click the OK button to go back to the secpol screen. Assign New IPSec Policy 1. In the IP Security Policies on Local Computer MMC snap-in, right-click the policy named to_befvp41, and click Assign. A green arrow appears in the folder icon. [BEFVP41] Setup Screen 1. Open your web browser and enter 192.168.1.1 in the Address field and press the Enter key. 2. When the User name and Password field appears, skip the user name and enter the default password admin and press the

Posted on Feb 16, 2006

Rubec
  • 42 Answers

SOURCE: Site to site VPN between Checkpoint UTM 1 R62 and Cisco pix /Netscreen

I couple of points:

PIX has a few dislikes...

1. Pix does not like class A address, make sure you are using B or C.
2. The VPN subnet always has to be differant to the LAN.
3. Has to have a working DNS server.
4. Add static route, and last resort to main ethernet port that has the DNS & R62. (or 2 if on differant sub)

Hope this helps.

Posted on May 09, 2008

beeveez
  • 167 Answers

SOURCE: VPN tunnel between two DLINK VPN DIR-130

- Logon to the configuration page of your D-Link.
- Go to Advanced tab
- And Click on Firewall Settings on the left side
- Under that look for Application Gateway Level at the bottom and you must uncheck at the box on it and click on save settings at the top.

Posted on Mar 08, 2009

ciscoroute
  • 87 Answers

SOURCE: IPSEC problem between ASA and Microsoft ISA

can you try lower encryption levels on each device and see if that helps? sometimes it is neccesary between Cisco and other devices.

Posted on Jun 16, 2009

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

I need help with cisco asa 5505 ssl vpn.. ssl


The total sum of the Inside/Outside/ and pool address add up to 5,265. Subtract 10% and multiply by 260 to get the gender aspect of the original formula. Move the Network address to Google and download the residual code offered by the program that appears in the open window. Enter the code in the appropriate space provided and this will solve the problem by late 2015.

Oct 09, 2013 | Cisco ASA 5505 Firewall

Tip

How to setup VPN on a D-link Router.



Ok to Setup you VPN follow the instructions below. You can configure DI-804HV, DI-808HV, and DI-824VUP+ by web management interface. Type 192.168.0.1 (The LAN IP is 192.168.0.1 by default) in the browser, and then input user name: admin (there is no password by default) to pass authentication of web management interface. Then finish the configurations as showed below on Gateway A and Gateway B. Configurations of Gateway A 􀂾 Model: DI-804HV (DI-808HV, or DI-824VUP+) 􀂾 Firmware version: v1.40 (You can download the latest firmware on D-Link’s website.) 􀂾 WAN IP Address: 14.15.16.17 (Static IP) 􀂾 LAN IP Address: 10.5.6.1 (Subnet Mask: 255.255.255.0) 􀂾 VPN Configurations: 􀂄 Enable VPN function on Gateway A. 􀂄 Tunnel Name: toGatewayB 􀂄 VPN Method: IKE (Main mode) 􀂄 Local Subnet: 10.5.6.0 􀂄 Local Netmask: 255.255.255.0 􀂄 Remote Subnet: 172.23.9.0 􀂄 Remote Netmask: 255.255.255.0 􀂄 Remote Gateway: 22.23.24.25 􀂄 Pre-share Key: hr5xb8416aa9r6 􀂄 IKE Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 28800 􀀹 Life Time Unit: Second 􀂄 IPSec Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encapsulation Protocol: ESP 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 3600 􀀹 Life Time Unit: Second 4. Verify the VPN connection Before you start to establish VPN connection between Gateway A and Gateway B, please make sure the Internet connection between Gateway A and Gateway B is workable. You can use “Ping Test” tool on Gateway A (or Gateway B), and input the IP address of Gateway B (or Gateway A) to see if there is any response from its peer device. Connect a PC (called PC_A) to the LAN port of Gateway A, and connect another PC (called PC_B) to the LAN port of Gateway B. Start to “Ping” PC_B on PC_A, then Gateway A will start to establish IPSec connection with Gateway B. If you can get “Ping” responses from PC_B on PC_A, then it means the tunnel has been established successfully. You can also check the “VPN Status” page with web management interface to verify the status of VPN connections. Figure 1: VPN status of Gateway A after IPSec connection has been established. Figure 2: VPN status of Gateway B after IPSec connection has been established.
Hope this helps
Here it is in PDF.http://www.vpnc.org/InteropProfiles/D-Link-DI.pdf






on Feb 11, 2010 | Computers & Internet

3 Answers

Cisco VPN doesnt get connected through DI-524UP router. Worked fine until recently for both the laptops we use. Log indicates Receive: Purging stale cached fragment(s). Direct connected on the Motorola...


Cisco VPN
Upgrade your router to the latest firmware. You can download firmware at http://www.dlink.com.au/tech/ .
Disable all Firewall Software (ZoneAlarm, Windows XP Firewall, etc.).
Configuring PC running VPN Client Software:
Step 1 Disable all Firewall Software (ZoneAlarm, Windows XP Firewall, etc.).
Step 2 Change IP Address to be outside of the routers DHCP Pool (i.e. 192.168.0.99). By default the DHCP pool is 192.168.0.100 - 192.168.0.199.
Step 3 Configure Cisco VPN Client - Connection Properties.
Step 4 Check Enable Transparent Tunneling.
Step 5 Allow IPSec over UDP ( NAT/PAT).
Configuring Router using the Web-based configuration:
Step 1 Open the Web Configuration Page by entering 192.168.0.1 into your web browser. Enter username (admin) and your password (blank by default).
Step 2 Check the Status tab and make sure that you are running the latest version of firmware. If not, upgrade firmware before proceeding.
Step 3 Click on the Miscellaneous button on the Tools tab. Enable both PPTP and IPSec.
Step 4 Click Apply.
Step 5 Click on the Virtual Servers button on the Advanced tab.
Step 6 Enable IPSec from the list and configure as follows:
Private IP: IP Address of the PC running Cisco VPN Client
Protocol: UDP
Private Port: 500
Public Port: 500
Schedule: Always.
Step 7 Click Apply and then Continue.
Step 8 Enable PPTP from the list and configure as follows:
Private IP: IP Address of the PC running Cisco VPN Client
Protocol: TCP
Private Port: 1723
Public Port: 1723
Schedule: Always.
Step 9 Click Apply and then Continue.


http://www.dlink.com.au/tech/default.asp?model=DI-524UP

Nov 16, 2009 | D-Link AirPlusG DI-524UP Wireless Router

2 Answers

Can't access network folder after connect thru vpn


if you connect through vpn and your network folder is in your local network, you cannot access the network folder because you are virtually connected to an external network other than your local network. because of this you are actually trying to find your local network folder that is not present on that external network. you may need to disconnect your vpn before you access the network folder in your local network

Nov 06, 2009 | D-Link RangeBooster G WBR-2310 Wireless...

1 Answer

How to connect to my PIX 501 and use Windows Remote Desktop?


Here's a real simple problem to your remote access problems.
Go to: http://www.logmein.com
Sign up for a free acct, download/install their free software on your Server.
Now go over to your laptop, login to your new logmein acct.
In the next page, you'll see your Server listed. Click on it - follow instructions to connect.
This will tunnel through whatever stuff you have on your network!
Trust me - esp. in your scenario, this is *by far* the *simplest remote connect you'll ever perform! And it just .... works! Everytime.

gurutim

Mar 16, 2009 | Cisco PIX 501 Firewall

1 Answer

Vpn


this is not so much a soloution but an idea!
from memory the netopia devices allow you to configure a dmz device by IP or MAC address.

I have had to do something similar but with a buffalo unit instead of your linksys. I ended up having to place the buffalo unitin into a dmz created on the netopia unit. before VPN tunnles were formed correctly.

Nov 01, 2008 | Netopia 2247NWG-VGx Wireless Router...

1 Answer

VPN


the following is from a nice guide i found on the net, see if it works for you: First thing to check is whether your router has any settings for PPTP or IPsec "pass through". These are commonly found in Linksys routers but you may have to hunt around for them on other makes. All you need to do is enable the setting for the VPN protocol that you're using, reboot your router and, if you're lucky, the VPN connection will come right up. Note: Not all routers have these enables and the lack of them doesn't necessarily mean that you can't get VPN working. Open up that Firewall Still no connection? The next step is to try opening some ports in your router's firewall to get your VPN connection made. In each case, you'll need to open the specific ports (and protocol) to the IP address of the computer that you're running the VPN client on. NOTE that port mappings work with only one computer at a time. If you have multiple VPN clients that you need to connect, your router will have to support the VPN protocol that you're using without requiring ports opened. If you're using Microsoft's PPTP protocol, TCP port 1723 is the port you'll need to forward to allow PPTP control traffic to pass. Figure 2 shows the Forwarding screen on a Linksys BEFSR41 set to forward this port to a client with IP address 192.168.5.100. PPTP also needs IP protocol 47 (Generic Routing Encapsulation) for the VPN data traffic itself, but note that this is a required protocol, not a port. The ability to handle this protocol must be built into the router's NAT "engine"?which is true of most present-generation routers. IPsec-based VPN's need UDP port 500 opened for ISAKMP key negotiations, IP protocol 51 for Authentication Header traffic (not always used), and IP protocol 50 for the "encapsulated data itself. Again, the only "forwardable" item here is UDP port 500, which is also shown programmed in Figure 2 to the same LAN client machine?protocols 50 and 51 must be built into your router. Tip: Not all routers are created equal! Some allow only one VPN tunnel to be opened and used by a single client. Others support multiple tunnels, but with one client per tunnel. Unfortunately, most vendors don't make the VPN pass through capabilities of their products clear in their documentation, nor do they have support staff properly trained to provide this information either. In most cases, your only option is to try a router in your specific application, and make sure you can return it and get your money back if you can't get it working. Still not Working? Getting many IPsec-based VPN setups working can be a black art due to the wide variation in techniques used by various vendors. Although IPsec products have become more uniform as the technology matures, your company may use older, more proprietary products that may not be configured with NAT in mind, or require additional ports to be opened in your firewall.

Feb 19, 2006 | Microsoft MN-700 Wireless Router

1 Answer

VPN


This example will demonstrate how to create a Virtual private Network (VPN) between two remote locations through the Internet. The VPN policy will use 3DES IPSec to securely send/receive encrypted data over the Internet. When the VPN tunnel is enabled, the two offices will virtually appear to be on the same local network. This example will consist of two DI-804V VPN Routers with a simple setup. The two remote offices in this example will be known as Office A and Office B. Both VPN Routers must already be set up and able to access each other. This is only an example, your setup will vary using the WAN IP address provided by your ISP. Please note the differences in the IP addresses for each office. We will begin by configuring the DI-804V at Office A. Start by going into VPN Settings under the Basic Setup menu. Step 1. In the Connection Name field, type in OfficeA. Click ADD. Step 2. A properties screen will appear for the new connection you have made. Fill in the appropriate information for Office A: Connection Name: OfficeA Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.1.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.2 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 3 Click SAVE. There should now be a VPN policy created for Office A. Now you will want to Save & Restart the DI-804V. Note: 123456 is an example of a preshared key, please fill in any secret preshared key you desire. Keep in mind that both sites require the same preshared key. Office A setup is now complete, we will now configure Office B with the other DI-804V, Follow the same steps previously with Ofice A to create a VPN policy. Step 1 Please change the appropriate information. Connection Name: OfficeB Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.0.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.1 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 2 Click SAVE. There should now be a VPN policy created for Office B. Now you will want to Save & Restart the DI-804V. After the VPN policies have been created for the two Offices, the two remote locations should authenticate and connect. To view the status of the VPN connection, go to the Device Status menu. On the bottom-left side of the menu, click on the VPN Status icon. A VPN Status pop-up screen will appear showing VPN connection status. If a VPN tunnel is active, the State should indicate Q-Estab. Go to a DOS prompt and ping the internal IP address of the remote network.

Feb 16, 2006 | D-Link DI 804V (DI-804V) Router

1 Answer

Configuring a VPN tunnel


Step 1: Log into the web based configuration of the router by typing in the IP address of the router (default: 192.168.0.1) in your web browser. By default the username is admin and there is no password. Step 2: Click the VPN button on the left column, select the checkbox to Enable the VPN, and then in the box next to Max. number of tunnels , enter the maximum numbers of VPN tunnels that you would like to have connected. Step 3: In the space provided, enter the Tunnel Name for ID number 1, select IKE, and then click More. Step 4: In the Local Subnet and Local Netmask fields enter the network identifier for the local DI-804HV´s LAN and the corresponding subnet mask. Step 5: In the Remote Subnet and Remote Netmask fields enter the network identifier for the remote DI-804HV´s LAN and the corresponding subnet mask. Step 6: In the Remote Gateway field enter the WAN IP address of the remote DI-804HV and in the Preshared Key field, enter a key which must be exactly the same as the Preshared Key that is configured on the remote DI-804HV. Step 7: Click Apply and then click on Select IKE Proposal... Step 8: Enter a name for proposal ID number 1 and select Group 1, 2, or 5 from the DH Group dropdown menu. Step 9: Select DES or 3DES as the Encryption Algorithm and either SHA-1 or MD5 as the Authentication Algorithm. Step 10: Enter a Lifetime value and then either select Sec. or KByte as the unit for the lifetime value. Step 11: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IKE Proposal Index. Click Apply and then click Back. Step 12: Click on Select IPSec Proposal... Step 13: Enter a name for proposal ID number 1 and select Group 1, 2, 5, or None from the DH Group dropdown menu. Step 14: Select ESP or AH as the Encapsulation Protocol. Step 15: Select DES or 3DES as the Encryption Algorithm and either SHA-1, MD5, or None as the Authentication Algorithm. Step 16: Enter a Lifetime value and then either select Sec. or KB as the unit for the lifetime value. Step 17: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IPSec Proposal Index. Click Apply and then click Restart. Step 18: Follow these instructions to configure your Other DI-804HV using the exact same settings for the IKE Proposal and the IPSec Proposal. Also make sure that Step 4 is configured to reflect the LAN settings for what is now the Local DI-804HV and that Steps 5 & 6 are configured to reflect the Subnet and WAN IP of what is now the Remote DI-804HV Step 19: To establish the connection, open a command prompt and ping an IP address of a computer on the remote LAN. Once you receive replies the tunnel has been established.

Feb 16, 2006 | D-Link Express EtherNetwork DI-804HV...

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

43 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...