Ike security descriptor, Ipsec security descriptor, Miscellaneous parameters – RCA 608WL User Manual
Page 200: Vpn server settings, Chapter 5

Chapter 5
Expert Configuration
E-DOC-CTC-20041126-0013 v1.0
198
IKE Security Descriptor
See
“ IKE Security Descriptors” on page 191
.
IPSec Security
Descriptor
See
“ IPSec Security Descriptors” on page 192
Miscellaneous
parameters
See
“ Miscellaneous parameters” on page 191
VPN Server settings
Comprises the following settings:
Virtual IP Range:
Specifies the range of IP addresses from which the VPN client addresses are
selected.
Netmask
Specifies the netmask provided to the VPN client. Use the dotted decimal
format.
Push IP
Check this box when you want the VPN server to take the initiative for
assigning an IP address to the VPN clients via IKE Mode Config.
When the check box is left unchecked, the VPN clients will request an IP
address from the VPN server.
Domain name
The domain name provided to the VPN clients via IKE Mode Config.
Primary DNS IP Address
The IP address of the primary DNS server, provided to the VPN clients via IKE
Mode Config. This is the primary DNS server in the local network that is open
to VPN clients.
Secondary DNS IP Address
The IP address of the secondary DNS server, provided to the VPN clients via
IKE Mode Config. This is the secondary DNS server in the local network that is
open to VPN clients.
Primary WINS IP Address
The IP address of the primary WINS server, provided to the VPN clients via IKE
Mode Config. This is the primary WINS server in the local network that is open
to VPN clients. A WINS server maps NETBIOS names to IP addresses.
Secondary WINS IP Address
The IP address of the secondary WINS server, provided to the VPN clients via
IKE Mode Config. This is the secondary WINS server in the local network that is
open to VPN clients.
XAuth
The SpeedTouch™ VPN server allows the use of the Extended Authorization
protocol with an internal user list. Two different types of Authentication
protocols can be selected: generic and chap. When the use of XAuth is
selected, a list of authorized users is to be composed. This is explained in
“ Authorized Users List” on page 199
.