![]() #Edgerouter x port forwarding wizard password#Set vpn l2tp remote-access authentication local-users username password Set vpn l2tp remote-access authentication mode local Set vpn l2tp remote-access ipsec-settings authentication pre-shared-secret Set vpn l2tp remote-access ipsec-settings authentication mode pre-shared-secret Set vpn ipsec ipsec-interfaces interface Set firewall name WAN_LOCAL rule 30 action accept NOTE:The show vpn remote-access and show vpn ipsec sa commands can be used to verify the VPN client sessions. Set firewall name WAN_LOCAL rule 60 protocol udp Set firewall name WAN_LOCAL rule 60 log disable Set firewall name WAN_LOCAL rule 60 ipsec match-ipsec Set firewall name WAN_LOCAL rule 60 destination port 1701 Set firewall name WAN_LOCAL rule 60 description l2tp Set firewall name WAN_LOCAL rule 60 action accept Set firewall name WAN_LOCAL rule 50 protocol udp Set firewall name WAN_LOCAL rule 50 log disable Set firewall name WAN_LOCAL rule 50 destination port 4500 Set firewall name WAN_LOCAL rule 50 description nat-t Set firewall name WAN_LOCAL rule 50 action accept Set firewall name WAN_LOCAL rule 40 protocol esp Set firewall name WAN_LOCAL rule 40 log disable Set firewall name WAN_LOCAL rule 40 description esp Set firewall name WAN_LOCAL rule 40 action accept ![]() Set firewall name WAN_LOCAL rule 30 protocol udp Set firewall name WAN_LOCAL rule 30 log disable Set firewall name WAN_LOCAL rule 30 destination port 500 Set firewall name WAN_LOCAL rule 30 description ike ![]() set firewall name WAN_LOCAL rule 30 action accept Add firewall rules for the L2TP traffic to the local firewall policy. You can do this using the CLI button in the Web UI or by using a program such as PuTTY.ΔΆ. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |