Contents
SmartLink 4020 Getting Started Guide
4
Specify fixed WAN configuration ...................................................................................................................23
Multicast Limits ..............................................................................................................................................23
Broadcast Limit .........................................................................................................................................23
Multicast Limit .........................................................................................................................................24
Saving your work ............................................................................................................................................24
WAN PPPoE Configuration .................................................................................................................................24
Enable PPPoE .................................................................................................................................................24
Authentication ................................................................................................................................................24
Settings ...........................................................................................................................................................24
Idle Timeout .............................................................................................................................................24
Echo Timeout ...........................................................................................................................................24
Echo Count ..............................................................................................................................................24
Service Name ............................................................................................................................................24
AC Name ..................................................................................................................................................25
Saving your work ............................................................................................................................................25
WAN VLAN Configuration..................................................................................................................................25
WAN VLAN Tag ...........................................................................................................................................25
WAN Priority Tag ..........................................................................................................................................25
Saving your work ............................................................................................................................................25
IPSec Configuration ..............................................................................................................................................26
Select Tunnel to view/modify .........................................................................................................................26
Enable tunnel 1 ...............................................................................................................................................26
Remote IP Address range ................................................................................................................................26
Remote security gateway .................................................................................................................................26
Security Mode .................................................................................................................................................26
Outbound AH SPI (DEC) ..............................................................................................................................26
Outbound AH Authentication Algorithm .......................................................................................................27
Outbound AH Authentication Key (HEX) .....................................................................................................27
Outbound ESP SPI (DEC) .............................................................................................................................27
Outbound ESP Encryption Algorithm ............................................................................................................27
Outbound ESP Authentication Algorithm ......................................................................................................27
Outbound ESP Encryption Key (HEX) ..........................................................................................................27
Outbound ESP Authentication Key (HEX) ....................................................................................................27
Inbound AH SPI (DEC) .................................................................................................................................27
Inbound AH Authentication Algorithm ..........................................................................................................27
Inbound AH Authentication Key (HEX) ........................................................................................................27
Inbound ESP SPI (DEC) ................................................................................................................................27
Inbound ESP Encryption Algorithm ...............................................................................................................27
Inbound ESP Authentication Algorithm .........................................................................................................27
Inbound ESP Encryption Key (HEX) .............................................................................................................27
Inbound ESP Authentication Key (HEX) .......................................................................................................27
Saving your work ............................................................................................................................................28
MAC Spoofing Configuration...............................................................................................................................28
WAN MAC Address (Spoofed) .......................................................................................................................28