How to configure IPSec VPN on 3G/4G Wireless Router TL-MR3420 (new logo)
Configuration Guide
Actualizado07-01-2024 03:28:17 AM99585
Este artículo se aplica a:
TL-MR3420( V5 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device and check either the Datasheet or the firmware section for the latest improvements added to your product.
With IPSec VPN, you can access the network securely when out of home. To use the VPN Service, you need to configure Dynamic DNS Service or assign a static IP address for the router’s WAN port. And the System Time should be synchronized with the internet.
Note: TL-MR3420_V5 is used for demonstration in this article.
• IPSec Connection Name: Enter a name for the IPSec VPN connection.
• Remote IPSec Gateway (URL): Enter the destination gateway IP address which is the public WAN IP or domain name of the remote VPN server endpoint.
• Tunnel access from local IP addresses: Select Subnet Address if you want the whole LAN to join the VPN network, or select Single Address if you want a single IP to join the VPN network.
• IP Address for VPN: Enter the IP address of your LAN.
• Subnet Mask: Enter the subnet mask of your LAN.
• Tunnel access from remote IP addresses: Select Subnet Address if you want the whole remote LAN to join the VPN network, or select Single Address if you want a single IP to join the VPN network.
• IP Address for VPN: Enter the IP address of the remote LAN.
• IP Subnet Mask: Enter the subnet mask of the remote LAN.
• Key Exchange Method: Select Auto (IKE) or Manual to be used to authenticate IPSec peers.
• Pre-Shared Key: Create a pre-shared key to be used for authentication.
• Perfect Forward Secrecy: Select Enable or Disable as an additional security protocol for the pre-shared key.
You can configure the advanced settings as needed. It’s recommended to keep the default values. If you want to change these settings, make sure that both VPN server endpoints use the same Encryption Algorithm, Integrity Algorithm, Diffie-Hellman Group and Key Lifetime in both phase1 and phase2.
5. Click Save.
Get to know more details of each function and configuration please go to Download Center to download the manual of your product.
¿Es útil esta pregunta frecuente?
Sus comentarios nos ayudan a mejorar este sitio.
¿Cuál es tu preocupación con este artículo?
Insatisfecho con el producto
Muy complicado
Titulo confuso
Eso no aplica a mi
Demasiado vago
Otro
¿Cómo podemos mejorarlo?
Gracias
Agradecemos sus comentarios. Haga clic aquí para comunicarse con el soporte técnico de TP-Link.
Las cookies de análisis nos permiten analizar sus actividades en nuestro sitio web para mejorar y adaptar la funcionalidad de nuestro sitio web.
Nuestros socios publicitarios pueden configurar las cookies de marketing a través de nuestro sitio web para crear un perfil de sus intereses y mostrarle anuncios relevantes en otros sitios web.