Once your are satisfied with all your settings, click the Apply button. If you
make any mistakes, clicking the Cancel button will exit the screen without sav-
ing any changes, provided that you have not already clicked the Apply button.
After the VPN device is set up at the other end of the tunnel, you may click the
Connect button to use the tunnel. This assumes that both ends of the tunnel
have a physical connection to each other (e.g., over the Internet, physical
wiring, etc.). After clicking the Connect button, click the Summary button. If
the connection is made, the screen shown in Figure 5-11will appear:
Under Status, the word Connected should appear if the connection is success-
ful. The other fields reflect the information that you entered on theVPN screen
to make the connection.
If Disconnected appears under Status, some problem exists that prevents the
creation of the tunnel. Make sure that all of your wiring is securely connected.
Double-check all the values you entered on the VPN screen to make sure they
are correct. If the other end of the tunnel is some distance from you (e.g., in
another city, etc.), call to make sure that the settings on that end of the tunnel
are correct as well.
If, for any reason, you experience a temporary disconnection, the connection will
be re-established as long as the settings on both ends of the tunnel stay the same.
EtherFast®Cable/DSL VPN Router with 4-Port 10/100 Switch
26
In order for any encryption to occur, the two ends of the tunnel must agree on
the type of encryption and the way the data will be decrypted. This is done by
sharing a “key” to the encryption code. Under Key Management, you may
choose Auto (IKE) and enter a series of numbers or letters in the Pre-shared
Key field. In the example shown in Figure 5-9, the word MyTest is used. Based
on this word, which MUST be entered at both ends of the tunnel if this method
is used, a code is generated to scramble (encrypt) the data being transmitted over
the tunnel, where it is unscrambled (decrypted). You may use any combination
of up to 23 numbers or letters in this field. No special characters or spaces are
allowed. In the Key Lifetime field, you may optionally select to have the key
expire at the end of a time period of your choosing. Enter the number of seconds
you’d like the key to be useful, or leave it blank for the key to last indefinitely.
Similarly, you may choose Manual Keying, which allows you to generate the
code yourself. Enter your code into the Encryption KEY field. Then enter an
Authentication KEY into that field. These fields must both match the infor-
mation that is being entered in the fields at the other end of the tunnel. The
example in Figure 5-10 shows some sample entries for both the Encryption and
Authentication Key fields. Again, up to 23 alphanumeric characters are
allowed to create this key.
The Inbound SPI and Outbound SPI fields are different, however. The
Inbound SPI value set here must match the Outbound SPI value at the other end
of the tunnel. The Outbound SPI here must match the Inbound SPI value at the
other end of the tunnel. In the example (see Figure 5-10), the Inbound SPI and
Outbound SPI values shown would be opposite on the other end of the tunnel.
Only numeric characters can be used in these fields.
Instant Broadband™ Series
25
Figure 6-9
Figure 6-10
Figure 6-11