
Example 3 – LAN-to-LAN Fixed IP Addresses Using RF560/550VPN
Multi-Tech Systems, Inc. RF760VPN/RF660VPN/RF600VPN Setup Examples Reference Guide (S000283D) 28
Example 3 LAN-to-LAN Configuration Chart:
LAN-to-LAN Application – Site A: RF660VPN-Static LAN-to-LAN Application – Site B: RF550VPN-Dynamic
1. Domain name = Site-A.com
2. Public Class C = 204.26.122.x
1. Domain name = Site-B.com
2. Public Class C = 204.26.122.x
3. Definitions | Network
LAN: 192.168.2.0 – 255.255.255.0
RemoteLAN: 192.168.10.0 – 255.255.255.0
4. Network | Interfaces
Default gateway = 204.26.122.1
Host name = fw.Site-A.com
Eth0 = LAN, 192,168.2.1, 255.255.255.0
Eth1 = WAN, 204.26.122.103, 255.255.255.0
Eth2 = DMZ (don’t care)
3. SETUP WIZARD | CABLE/xDSL ISP SETTINGS
Check ‘Your ISP requires you to input IP settings’
IP assigned by your ISP: 204.26.122.3
IP Subnet Mask: 255.255.255.0
ISP Gateway Address: 204.26.122.103
Domain name Server: 0.0.0.0
6. Packet Filter | Rules
LAN – Any – Any – Accept
RemoteLAN – Any – Any – Accept
7. VPN | IPSec
Check and Save VPN Status
Add an IKE connection:
Connection name = SiteA
Check Perfect Forward Secrecy
Authentication Method = Secret
Enter secret key (must be the same on both
sides)
Local WAN IP = WAN
Local LAN Subnet = LAN
Remote Gateway IP = Any
Remote LAN = RemoteLAN
Disable UID
4. SETUP WIZARD | VPN SETTINGS
Connection Name = SiteBtoA
Disable UID
Check Enabled Keep Alive
Remote IP Network = 192.168.2.0
Remote IP Netmask = 255.255.255.0
Remote Gateway IP = 204.26.122.103
Network Interface = WAN ETHERNET
Secure Association = check IKE
Perfect Forward Secure = check enabled
Encryption Protocol = 3DES
Preshared Key = (must match secret code at Site A)
Key Life = set to default
IKE Life Time = set to default
Comentários a estes Manuais