Question about D-Link Computers & Internet

Open Question

Zywall ipsec vpn - D-Link Computers & Internet

Posted by Anonymous on

Ad

6 Suggested Answers

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of.(from cars to computers, handyman, and even drones)
click here to download the app (for users in the US for now) and get all the help you need.
Goodluck!

Posted on Jan 02, 2017

Ad
  • 128 Answers

SOURCE: Nortel Extranet VPN using ESP IPSec

Step 1 Go into the web-based configuration on the router (enter 192.168.0.1 in your web brower). Enter username (admin) and password (blank). Step 2 Click on Advanced at the top and then click on Applications on the left side. Step 3 Check Enable Step 4 Enter a name (i.e. Nortel). Step 5 Enter 500 for Trigger Port (500 - 500). Step 6 Select Both for Trigger Type. Step 7 Enter 500 for Public Port. Step 8 Select Both for Public Type. Step 9 Click Apply and then click on Continue when prompted.

Posted on Feb 16, 2006

Ad
  • 196 Answers

SOURCE: Configuring the DI-804HV/DI-808HV

Step 1: Log into the web based configuration of the router by typing in the IP address of the router (default: 192.168.0.1) in your web browser. By default the username is admin and there is no password. Step 2: Click the VPN button on the left column, select the checkbox to Enable the VPN, and then in the box next to Max. number of tunnels, enter the maximum numbers of VPN tunnels that you would like to have connected. Step 3: In the space provided, enter the Tunnel Name for ID number 1, select IKE, and then click More. Step 4: In the Local Subnet and Local Netmask fields enter the network identifier for DI-804HV´s LAN and the corresponding subnet mask. Step 5: In the Remote Subnet and Remote Netmask fields enter the network identifier for the DI-804V´s LAN and the corresponding subnet mask. Step 6: In the Remote Gateway field enter the WAN IP address of the remote DI-804V and in the Preshared Key field, enter a key which must be exactly the same as the Preshared Key that is configured on the DI-804V. Step 7: Click Apply and then click on Select IKE Proposal... Step 8: Enter a name for proposal ID number 1 and select Group 2 from the DH Group drop-down menu. Step 9: Select 3DES as the Encryption Algorithm and SHA-1 as the Authentication Algorithm. Step 10: Enter a Lifetime value of 28800 and then select Sec. as the unit for the lifetime value. Step 11: Select 1 out of the Proposal ID drop-down menu and click Add To, which will add the proposal that was just configured to the IKE Proposal Index. Click Apply and then click Back. Step 12: Click on Select IPSec Proposal... Step 13: Enter a name for proposal ID number 1 and select None from the DH Group drop-down menu. Step 14: Select ESP as the Encapsulation Protocol. Step 15: Select 3DES as the Encryption Algorithm and MD5 as the Authentication Algorithm. Step 16: Enter a Lifetime value of 3600 and then select Sec. as the unit for the lifetime value. Step 17: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IPSec Proposal Index. Click Apply and then click Restart. Configuring the DI-804V: Step 1: Access the router?s web configuration by entering the router?s IP address in your web browser. The default IP address is 192.168.0.1. Login using your password. The default username is admin and the password is blank. Help Accessing Web Management Step 2: Click on Basic Setup and then select Device IP Settings on the left. Step 3: Change the LAN IP address so that it is on a different subnet than the LAN of the DI-804HV (ie 192.168.1.1). Step 4: Click Next until you reach the Save & Restart screen. Click Save & Restart and then click Basic Setup once the unit has rebooted. Step 3: Click on VPN Settings. Step 4: Name your VPN connection and click ADD. Step 5: In Remote IP Network and Remote IP Netmask fields enter the network identifier and corresponding subnet mask of the DI-804HV´s LAN. Step 6: In the Remote Gateway IP field enter the WAN IP address of the DI-804HV and make sure that the Network Interface is set to WAN Ethernet. Step 7: Verify that Secure Association is set to IKE and that Perfect Forward Secure is Disabled. Step 8: Verify the Encryption Protocol is set to 3DES and enter in your Preshared Key. The Preshared Key needs to be identical to the one configured on the DI-804HV Step 9: Leave the Key Life and IKE Life Time values at their default levels and click SAVE. Step 10: Click Next and then click on Save & Restart Establishing a connection: Step 1: Open a command prompt (Start > Run and type CMD) and from a computer on the internal LAN of the DI-804HV, ping the IP address of a computer that is on the internal LAN of the DI-804V, or vice versa. Step 2: Once you begin to receive replies, the VPN connection has been established. Step 3: To view the Status of the VPN on the DI-804V, click on Device Status. Step 4: From the Device Status screen click on VPN Status. Step 5: When the VPN has been established, the Status will be Active.

Posted on Feb 16, 2006

  • 196 Answers

SOURCE: Configuring IPSec between a Microsoft Windows 2000 or XP PC and a Linksys VPN Router

Windows XP or Windows 2000 IP Address: 140.111.1.2 ? User ISP provide IP Address, this is only a sample Subnet Mask: 255.255.255.0 BEFVP41 WAN IP Address: 140.111.1.1 ? User ISP provide IP Address, this is only a sample Subnet Mask: 255.255.255.0 LAN IP Address: 192.168.1.1 Subnet Mask: 255.255.255.0 Step-by-Step [Windows 2000/XP] Create IPSec Policy 1. Click the Start button, select Run, and type secpol.msc. in the open field. 2. Right-click IP Security Policies on Local Computer and click Create IP Security Policy. 3. Click the Next button, and then type a name for your policy (for example, ?to_befvp41?). Then, click Next. 4. Deselect the Activate the default response rule check box and then click the Next button. 5. Click the Finish button, making sure the Edit check box is checked. Build 2 Filter Lists: ?WinXP? BEFVP41? and ?BEFVP41? WinXP?. Note: The references in this section to ?WinXP? can easily be exchanged for ?Win2000?, if running Windows 2000. Filter List 1: WinXP? BEFVP41 1. In the new policy properties, deselect the Use Add Wizard check box and then click the Add button to create a new rule. 2. From the IP Filter List tab, click the Add button. 3. Type an appropriate name ?WinXP? BEFVP41? for the filter list, deselect the Use Add Wizard check box, and click the Add button. 4. In the Source address field, select My IP Address. 5. In the Destination address field, select A specific IP Subnet, and fill in the IP Address 192.168.1.0 and Subnet mask 255.255.255.0. 6. If you want to type a description for your filter, click the Description tab. 7. Click the OK button. Then click the OK (for WinXP) or Close (for WIN2000) button on the IP Filter List window. Filter List 2: BEFVP41? WinXP 8. On the IP Filter List tab, click the Add button. 9. Type an appropriate name ?BEFVP41? WinXP? for the filter list, deselect the Use Add Wizard check box, and click the Add button. 10. In the Source address field, select A specific IP Subnet, and fill in the IP Address 192.168.1.0 and Subnet mask 255.255.255.0. 11. In the Destination address field, select My IP Address. 12. If you want to type a description for your filter, click the Description tab. 13. Click the OK button and click the OK (for WinXP) or Close (for Win2000) button on IP Filter List window. Configure Individual Rule of 2 Tunnels Tunnel 1: WinXP? BEFVP41 1. From the IP Filter List tab, click the filter list WinXP? BEFVP41. 2. From the Filter Action tab, click the filter action ?Require Security?, and click the Edit button. 3. verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. 4. Select the Session key perfect forward secrecy (PFS) and remember to check the PFS option on the BEFVP41, and click the OK button. 5. From the Authentication Methods tab, click the Edit button. 6. Change the authentication method to Use this string (preshared key), enter the string ?XYZ12345?, and click the OK button. This new Preshared key will be displayed. Click the OK button to continue. 7. From the Tunnel Setting tab, click The tunnel endpoint is specified by this IP Address radio button and type the WAN IP Address 140.111.1.1 of the BEFVP41. 8. From the Connection Type tab, Select All network connections and click the OK button to finish this rule. Tunnel 2: BEFVP41? WinXP 9. In the new policy properties, deselect the Use Add Wizard check box and click the Add button to create the second IP Filter. 10. From the IP Filter List tab, click the filter list BEFVP41? WinXP. 11. From the Filter Action tab, select the filter action Require Security. 12. From the Authentication Methods tab, click the Edit button. 13. Change the authentication method to Use this string (preshared key), enter the string ?XYZ12345?, and then click the OK button. This new Preshared key will be displayed. Click the OK button to continue. 14. From the Tunnel Setting tab, click the radio button for The tunnel endpoint is specified by this IP Address and type the Windows 2000/XP IP Address 140.111.1.2. 15. From the Connection Type tab, select All network connections. Then, click the OK (for WInXP) or Close (for Win2000) button to finish . 16. From the Rules tab, click the OK button to go back to the secpol screen. Assign New IPSec Policy 1. In the IP Security Policies on Local Computer MMC snap-in, right-click the policy named to_befvp41, and click Assign. A green arrow appears in the folder icon. [BEFVP41] Setup Screen 1. Open your web browser and enter 192.168.1.1 in the Address field and press the Enter key. 2. When the User name and Password field appears, skip the user name and enter the default password admin and press the

Posted on Feb 16, 2006

XBRMann
  • 38 Answers

SOURCE: DLink DI-624s - can't get Cisco VPN Client to connect.

The "Virtual Server" setting is designed to give the general public access to a network resrouce (web/ftp/media server) on your internal network. If your the VPN concentrator is external to your network (meaning you'll have to use the internet to connect to it), then you won't need to define a virtual server on the DI-624.

You'll just need to enable the IPSEC and PPTP VPN Passthrough which it sounds like you've already done this. I've run into some ISP's that block VPN connections out of their network. If you have the ability, try to directly connect your laptop into your cable/DSL modem in place of your router and see if you can make a VPN connection, if not contact your ISP, if you can then verify you enabled the VPN passthroughs because your router is blocking them.

GIve it a shot and let us know your results.

Posted on Apr 27, 2008

  • 1 Answer

SOURCE: DIR 625 IPSec cisco vpn solution

go to "advanced", firewall settings, in ALG configuration uncheck "VPN". It will work and that's the easiest way to fix this issue.

Posted on Aug 27, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Zywall usg 50 won't VPN to 3Com officeconnect


Check the system log of the devices. The log usually can tell you why the VPN is not working.

Apr 02, 2014 | Zyxel ZYWALL USG 50 SEC-GTW 5 VPN TUNNEL -...

1 Answer

Zywall l2tp ipsec


There are many root causes can make the VPN connection not stable. You should try to rule out the possibility that the outdated firmware cause the issue first. Contact zyxel tech support after you update the firmware.

Feb 19, 2014 | Zyxel ZYWALL USG 50 SEC-GTW 5 VPN TUNNEL -...

1 Answer

How do I enable IPSEC Passthrough on this wireless router?


look in the settings of the Belkin to see if you can enable VPN Pass-through.

Try disabling some of the firewall functions on the belkin to isolate the issue and turn the rest back on.

If for some reason this model doesn't work even after the above, try changing the VPN client's connection settings,there are only two to choose from... (click modify on your connection entry, go to the Transport tab > then choose from:
IPSec over TCP and IPSec over UDP (port 10000)

Sep 30, 2013 | Belkin (F5D7230-4) Router (587009)

3 Answers

Cisco VPN doesnt get connected through DI-524UP router. Worked fine until recently for both the laptops we use. Log indicates Receive: Purging stale cached fragment(s). Direct connected on the Motorola...


Cisco VPN
Upgrade your router to the latest firmware. You can download firmware at http://www.dlink.com.au/tech/ .
Disable all Firewall Software (ZoneAlarm, Windows XP Firewall, etc.).
Configuring PC running VPN Client Software:
Step 1 Disable all Firewall Software (ZoneAlarm, Windows XP Firewall, etc.).
Step 2 Change IP Address to be outside of the routers DHCP Pool (i.e. 192.168.0.99). By default the DHCP pool is 192.168.0.100 - 192.168.0.199.
Step 3 Configure Cisco VPN Client - Connection Properties.
Step 4 Check Enable Transparent Tunneling.
Step 5 Allow IPSec over UDP ( NAT/PAT).
Configuring Router using the Web-based configuration:
Step 1 Open the Web Configuration Page by entering 192.168.0.1 into your web browser. Enter username (admin) and your password (blank by default).
Step 2 Check the Status tab and make sure that you are running the latest version of firmware. If not, upgrade firmware before proceeding.
Step 3 Click on the Miscellaneous button on the Tools tab. Enable both PPTP and IPSec.
Step 4 Click Apply.
Step 5 Click on the Virtual Servers button on the Advanced tab.
Step 6 Enable IPSec from the list and configure as follows:
Private IP: IP Address of the PC running Cisco VPN Client
Protocol: UDP
Private Port: 500
Public Port: 500
Schedule: Always.
Step 7 Click Apply and then Continue.
Step 8 Enable PPTP from the list and configure as follows:
Private IP: IP Address of the PC running Cisco VPN Client
Protocol: TCP
Private Port: 1723
Public Port: 1723
Schedule: Always.
Step 9 Click Apply and then Continue.


http://www.dlink.com.au/tech/default.asp?model=DI-524UP

Nov 16, 2009 | D-Link AirPlusG DI-524UP Wireless Router

1 Answer

DLink DI-624s - can't get Cisco VPN Client to connect.


The "Virtual Server" setting is designed to give the general public access to a network resrouce (web/ftp/media server) on your internal network. If your the VPN concentrator is external to your network (meaning you'll have to use the internet to connect to it), then you won't need to define a virtual server on the DI-624.

You'll just need to enable the IPSEC and PPTP VPN Passthrough which it sounds like you've already done this. I've run into some ISP's that block VPN connections out of their network. If you have the ability, try to directly connect your laptop into your cable/DSL modem in place of your router and see if you can make a VPN connection, if not contact your ISP, if you can then verify you enabled the VPN passthroughs because your router is blocking them.

GIve it a shot and let us know your results.

Apr 26, 2008 | D-Link AirPlus Xtreme G DI-624 Wireless...

1 Answer

Cisco VPN Client won't connect


You'll want to enable the VPN transparency. In the router's administrative web interface, click the Security Tab, then the VPN Passthrough sub-tab. Cisco VPN's usually use IPSEC, so enable the IPSEC Pass-through and click "Save Settings". If this doesn't work enable the PPTP Pass-through as well and give that a shot.

Dec 31, 2007 | D-Link AirPlus Xtreme G DI-624 Wireless...

1 Answer

VPN


This example will demonstrate how to create a Virtual private Network (VPN) between two remote locations through the Internet. The VPN policy will use 3DES IPSec to securely send/receive encrypted data over the Internet. When the VPN tunnel is enabled, the two offices will virtually appear to be on the same local network. This example will consist of two DI-804V VPN Routers with a simple setup. The two remote offices in this example will be known as Office A and Office B. Both VPN Routers must already be set up and able to access each other. This is only an example, your setup will vary using the WAN IP address provided by your ISP. Please note the differences in the IP addresses for each office. We will begin by configuring the DI-804V at Office A. Start by going into VPN Settings under the Basic Setup menu. Step 1. In the Connection Name field, type in OfficeA. Click ADD. Step 2. A properties screen will appear for the new connection you have made. Fill in the appropriate information for Office A: Connection Name: OfficeA Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.1.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.2 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 3 Click SAVE. There should now be a VPN policy created for Office A. Now you will want to Save & Restart the DI-804V. Note: 123456 is an example of a preshared key, please fill in any secret preshared key you desire. Keep in mind that both sites require the same preshared key. Office A setup is now complete, we will now configure Office B with the other DI-804V, Follow the same steps previously with Ofice A to create a VPN policy. Step 1 Please change the appropriate information. Connection Name: OfficeB Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.0.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.1 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 2 Click SAVE. There should now be a VPN policy created for Office B. Now you will want to Save & Restart the DI-804V. After the VPN policies have been created for the two Offices, the two remote locations should authenticate and connect. To view the status of the VPN connection, go to the Device Status menu. On the bottom-left side of the menu, click on the VPN Status icon. A VPN Status pop-up screen will appear showing VPN connection status. If a VPN tunnel is active, the State should indicate Q-Estab. Go to a DOS prompt and ping the internal IP address of the remote network.

Feb 16, 2006 | D-Link DI 804V (DI-804V) Router

1 Answer

How does this product differ from the 3Com OfficeConnect Cable/DSL Secure Gateway?


The 3Com OfficeConnect Cable/DSL Secure Gateway includes all the security features provided by the 3Com OfficeConnect Cable/DSL Gateway, plus a full-function stateful packet inspection firewall for additional security. The 3Com OfficeConnect Cable/DSL Secure Gateway also provides VPN initiation/termination that supports the PPTP, IPSec, L2TP/IPSec, and VPN protocols.

Feb 16, 2006 | 3Com (3CR856-95-UK) Firewall

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

15 people viewed this question

Ask a Question

Usually answered in minutes!

Top D-Link Computers & Internet Experts

Prashant M
Prashant M

Level 3 Expert

2260 Answers

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18408 Answers

Are you a D-Link Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...