EasyManuals Logo

TP-Link SafeStream TL-ER6020 User Manual

TP-Link SafeStream TL-ER6020
168 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #88 background imageLoading...
Page #88 background image
-83-
3.5 VPN
VPN (Virtual Private Network) is a private network established via the public network, generally via the
Internet. However, the private network is a logical network without any physical network lines, so it is
called Virtual Private Network.
With the wide application of the Internet, more and more data are needed to be shared through the
Internet. Connecting the local network to the Internet directly, though can allow the data exchange, will
cause the private data to be exposed to all the users on the Internet. The VPN (Virtual Private Network)
technology is developed and used to establish the private network through the public network, which
can guarantee a secured data exchange.
VPN adopts the tunneling technology to establish a private connection between two endpoints. It is a
connection secured by encrypting the data and using point-to-point authentication. The following
diagram is a typical VPN topology.
Figure 3-57 VPN – Network Topology
As the packets are encapsulated and de-encapsulated in the Router, the tunneling topology
implemented by encapsulating packets is transparent to users. The tunneling protocols supported by
TL-ER6020 contain Layer 3 IPsec and Layer 2 L2TP/PPTP.
3.5.1 IKE
In the IPsec VPN, to ensure a secure communication, the two peers should encapsulate and
de-encapsulate the packets using the information both known. Therefore the two peers need to
negotiate a security key for communication with IKE (Internet Key Exchange) protocols.
Actually IKE is a hybrid protocol based on three underlying security protocols, ISAKMP (Internet
Security Association and Key Management Protocol), Oakley Key Determination Protocol, and
SKEME Security Key Exchange Protocol. ISAKMP provides a framework for Key Exchange and SA
(Security Association) negotiation. Oakley describes a series of key exchange modes. SKEME
describes another key exchange mode different from those described by Oakley.
IKE consists of two phases. Phase 1 is used to negotiate the parameters, key exchange algorithm and
encryption to establish an ISAKMP SA for securely exchanging more information in Phase 2. During
phase 2, the IKE peers use the ISAKMP SA established in Phase 1 to negotiate the parameters for
security protocols in IPsec and create IPsec SA to secure the transmission data.

Other manuals for TP-Link SafeStream TL-ER6020

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the TP-Link SafeStream TL-ER6020 and is the answer not in the manual?

TP-Link SafeStream TL-ER6020 Specifications

General IconGeneral
Ethernet LANYes
Cabling technology10/100/1000Base-T(X)
Networking standardsIEEE 802.3, IEEE 802.3ab, IEEE 802.3u
VPN tunnels quantity50
Ethernet LAN data rates10, 100, 1000 Mbit/s
Ethernet LAN interface typeGigabit Ethernet
Maximum indoor range100 m
RS-232 ports1
Ethernet LAN (RJ-45) ports3
Form factor1U
USB ports quantity0
Management platformWeb/CLI/Telnet
Filtering descriptionMAC, URL/Keywords, WebContent
Compatible operating systemsMicrosoft Windows 98SE, NT, 2000, XP, Vista, Windows 7\\r MAC OS\\r NetWare, UNIX, Linux
Routing protocolsRIP-1, RIP-2
Supported protocolsIPsec/PPTP/L2TP
Supported network protocolsTCP/IP, DHCP, ICMP, NAT, PPPoE, SNTP, HTTP, DNS, IPsec, PPTP, L2TP
VPN support50 IPsec VPN Tunnels LAN-to-LAN, Client-to-LAN Main, Aggressive Negotiation Mode DES, 3DES, AES128, AES192, AES256 Encryption Algorithm MD5, SHA1 Authentication Algorithm IPsec NAT Traversal (NAT-T) Dead Peer Detection (DPD) Perfect Forward Secrecy (PFS) 16 PPTP VPN Tunnels PPTP VPN Server/Client PPTP with MPPE Encryption 16 L2TP VPN Tunnels L2TP VPN Server/Client L2TP over IPsec
NAT functionalityOne-to-One NAT\\r Multi-nets NAT\\r Virtual Server, DMZ Host, Port_Triggering, UPnP\\r FTP/H.323/SIP/IPsec/PPTP ALG
Security algorithms128-bit AES, 256-bit AES, 3DES, DES
Authentication methodMD5, SHA-1
Network Address Translation (NAT) sessions (max)30000
Flash memory16 MB
CertificationCE, FCC, RoHS
Internal memory128 MB
Internal memory typeDDR2
Mac operating systems supportedmacOS
Windows operating systems supportedWindows 10, Windows 2000, Windows 7, Windows 8, Windows 8.1, Windows 98SE, Windows NT, Windows Vista, Windows XP
AC input voltage100 - 240 V
Power source typeAC
AC input frequency50 - 60 Hz
Power over Ethernet (PoE)No
Power consumption (typical)- W
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 90 %
Operating relative humidity (H-H)10 - 90 %
Product colorBlack
Sustainability certificatesRoHS
Package depth250 mm
Package width400 mm
Package height80 mm
Package weight1810 g
Weight and Dimensions IconWeight and Dimensions
Depth180 mm
Width294 mm
Height44 mm
Weight- g

Related product manuals