How to use IPSec VPN to access your home network on AC VDSL/ADSL Modem Router (new logo)

Archer VR900( V3 ) , Archer VR2100v , Archer VR2600v , Archer VR900v , Archer VR2100( V1 ) , Archer VR2800v( V1 ) , Archer VR600v , Archer VR2800( V1 ) , Archer VR1200v , Archer VR1210v , TD-W9960v , Archer VR300( V1 V1.20 ) , Archer VR400( V2 ) , Archer VR600( V2 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device, and check either the Datasheet or the firmware section for the latest improvements added to your product. Please note that product availability varies by region, and certain models may not be available in your region.
IPSec VPN is used to create a VPN connection between local and remote networks. To use IPSec VPN, you should check that both local and remote routers support IPSec VPN feature. Then, follow the steps below to set up an IPSec VPN connection.
Here takes Archer VR2800 as demonstration.
1. The typical VPN topology is here. Site A refers to local network, and Site B refers to the remote network that is to be connected. Record Site A and Site B’s LAN and WAN IP addresses before you start configuration.
2. Configuration on Site A (local network).
1) Log in the web interface of the modem router. You can refer to How to log into the web-based interface of the AC VDSL/ADSL Modem Router (new logo)?
2) Go to Advanced > VPN > IPSec VPN, and click Add.
3) In the IPSec Connection Name column, specify a name.
4) In the Remote IPSec Gateway (URL) column, Enter Site B’s WAN IP address.
5) Configure Site A’s LAN.
In the Tunnel access from local IP addresses column, we take Subnet Address as an example. Input the LAN IP range of Site A in the IP Address for VPN column, and input Subnet Mask of Site A.
6) Configure Site B’s LAN.
In the Tunnel access from remote IP addresses column, we take Subnet Address as an example. Input the LAN IP range of Site B in the IP Address for VPN column, and input Subnet Mask of Site B.
7) Select the Key Exchange Method for the policy. We select Auto(IKE) here.
8) Enter the Pre-Shared Key for IKE authentication. Then keep Perfect Forward Secrecy enabled.
Note: Make sure Site A and Site B use the same key.
9) Leave the Advanced Settings as default value. Then click Save.
3. Configuration on Site B (remote network). Refer to step 2 configuration on Site A and make sure that Site A and Site B use the same pre-shared keys and Perfect Forward Secrecy settings.
4. Check the VPN connection. You can ping site B’ LAN IP from your computer in site A to verify that the IPSec VPN connection is set up correctly.
Tips: To check the VPN connection, you can do the following.
On the host in Site A, press [Windows Logo] + [R] to open Run dialog. Input “cmd” and hit OK.
In the CLI window, type in “ping 192.168.2.x” (“192.168.2.x” can be IP address of any host in Site B). Then press [Enter].
If Ping proceeds successfully (gets replies from host in Site B), the IPSec connection is working properly now.
5. Now IPSec VPN is implemented to establish a connection.
Note:
1. The product supports a maximum of ten simultaneous connections.
2. If one of the site has been offline for a while, for example, if Site A has been disconnected, on Site B you need to click Disable and then click Enable after Site A back on line in order to re-establish the IPSec tunnel.
Get to know more details of each function and configuration please go to Download Center to download the manual of your product.
Ez a GY.I.K. hasznos volt?
Véleménye segíti az oldal fejlesztését
What’s your concern with this article?
- Dissatisfied with product
- Too Complicated
- Confusing Title
- Does not apply to me
- Too Vague
- Other
Thank you
We appreciate your feedback.
Click here to contact TP-Link technical support.
Recommend Products
Ez a weboldal cookie -kat használ a weboldal navigációjának javítása, az online tevékenységek elemzése és a felhasználók számára a legjobb élmény biztosítása érdekében. A cookie -k használata ellen bármikor tiltakozhat. További információt az adatvédelmi irányelveinkben talál.
Ez a weboldal cookie -kat használ a weboldal navigációjának javítása, az online tevékenységek elemzése és a felhasználók számára a legjobb élmény biztosítása érdekében. A cookie -k használata ellen bármikor tiltakozhat. További információt az adatvédelmi irányelveinkben talál.
Alap Cookie-k
Ezek a cookie -k a webhely működéséhez szükségesek, és nem tilthatók le a rendszereiben.
TP-Link
accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Live-Chat
__livechat, __lc2_cid, __lc2_cst, __lc_cid, __lc_cst, CASID
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Marketing és Elemző Cookie-k
Az elemző cookie -k lehetővé teszik számunkra, hogy elemezzük weboldalunkon végzett tevékenységeit, hogy javítsuk és módosítsuk webhelyünk működését.
Hirdetési partnereink a weboldalunkon keresztül marketing cookie -kat állíthatnak be annak érdekében, hogy érdeklődési körének profilját, és hogy releváns hirdetéseket jelenítsen meg más webhelyeken.
Google Analytics & Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads & DoubleClick
test_cookie, _gcl_au
Meta Pixel
_fbp
Crazy Egg
cebsp_, _ce.s, _ce.clock_data, _ce.clock_event, cebs
lidc, AnalyticsSyncHistory, UserMatchHistory, bcookie, li_sugr, ln_or