VPN configuration

Virtual Private Networking (VPN) uses a public network (i.e. the Internet) to securely connect two different networks.
This unit can pass-through or terminate VPN connections. The configuration here is for termination of VPN connections.


You can create VPN connections using interactive wizards (recommended), or manually (advanced users).
The wizards create VPN connections suitable for most VPN clients. The resulting VPN configurations can be edited or deleted manually later. You can create several VPN configurations and use them simultaneously.

VPN Server Wizard - Allow remote clients to connect to your network.
(Create Client Certificate Bundle - Create certificates to be used by remote clients.)

VPN Client Wizard - Connect to a remote VPN server.

Manual VPN configuration - For advanced users.













VPN Server Wizard
Allow remote clients to connect to your network.

VPN protocol - There are several different VPN protocols that can be used to connect. Some of the protocols are easy to use, though offering only limited security. Some other protocols give very high security - but are very difficult to configure.
You should decide what is most important for you: easy configuration or high security?
A good compromise is the L2TP protocol that is easy to configure, yet gives a high level of security.

PPTP - The PPTP protocol is extremely easy to use. PPTP clients are already included in most Microsoft Windows operating systems, and all you need to specify is a user name and password for each person allowed to log in. However, the PPTP protocol is considered to be very unsecure.
Select this protocol if your main concern is the VPN to be easy-to-use.

L2TP - The L2TP protocol is easy to use yet offers high security. L2TP clients are already included in most Microsoft Windows operating systems, all you need to specify is a user name and password for each person allowed to log in, plus a pre-shared key shared by all clients. The L2TP protocol is transmitted inside IPSec packets to ensure high security.
Select this protocol if you want an easy-to-use VPN that still offers high security.

IPSec (Key) - The IPSec protocol used with pre-shared key as identification combines medium-difficult configuration with high level of security.
However please NOTE that to achieve high level of security with this protocol the connecting clients must have static global IP addresses!
You can still use this protocol even with clients without static global IP addresses, but with reduced security.
Select this protocol if your main concern is the VPN to be secure, and the clients have static IP addresses.

IPSec (Certificate) - The IPSec protocol used with certificates provide extreme security - but they are very difficult to configure.
Certificate files has to be exchanged between the server and each of its clients. After installing this server you need to add client certificates to it later.
Select this protocol if your main concern is the VPN to be as secure as possible, never mind installation difficulties.


Read more online:
VPN Server Wizard