How to configure IPSec VPN on 3G/4G Wireless Router TL-MR3420 (new logo)
Configuration Guide
Updated 07-01-2024 03:28:17 AM100368
This Article Applies to:
TL-MR3420( V5 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device and check either the Datasheet or the firmware section for the latest improvements added to your product.
With IPSec VPN, you can access the network securely when out of home. To use the VPN Service, you need to configure Dynamic DNS Service or assign a static IP address for the router’s WAN port. And the System Time should be synchronized with the internet.
Note: TL-MR3420_V5 is used for demonstration in this article.
• IPSec Connection Name: Enter a name for the IPSec VPN connection.
• Remote IPSec Gateway (URL): Enter the destination gateway IP address which is the public WAN IP or domain name of the remote VPN server endpoint.
• Tunnel access from local IP addresses: Select Subnet Address if you want the whole LAN to join the VPN network, or select Single Address if you want a single IP to join the VPN network.
• IP Address for VPN: Enter the IP address of your LAN.
• Subnet Mask: Enter the subnet mask of your LAN.
• Tunnel access from remote IP addresses: Select Subnet Address if you want the whole remote LAN to join the VPN network, or select Single Address if you want a single IP to join the VPN network.
• IP Address for VPN: Enter the IP address of the remote LAN.
• IP Subnet Mask: Enter the subnet mask of the remote LAN.
• Key Exchange Method: Select Auto (IKE) or Manual to be used to authenticate IPSec peers.
• Pre-Shared Key: Create a pre-shared key to be used for authentication.
• Perfect Forward Secrecy: Select Enable or Disable as an additional security protocol for the pre-shared key.
You can configure the advanced settings as needed. It’s recommended to keep the default values. If you want to change these settings, make sure that both VPN server endpoints use the same Encryption Algorithm, Integrity Algorithm, Diffie-Hellman Group and Key Lifetime in both phase1 and phase2.
5. Click Save.
Get to know more details of each function and configuration please go to Download Center to download the manual of your product.
Is this faq useful?
Your feedback helps improve this site.
What’s your concern with this article?
Dissatisfied with product
Too Complicated
Confusing Title
Does not apply to me
Too Vague
Other
Thank you
We appreciate your feedback. Click here to contact TP-Link technical support.
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy . Don’t show again
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy . Don’t show again
Basic Cookies
These cookies are necessary for the website to function and cannot be deactivated in your systems.
Analysis cookies enable us to analyze your activities on our website in order to improve and adapt the functionality of our website.
The marketing cookies can be set through our website by our advertising partners in order to create a profile of your interests and to show you relevant advertisements on other websites.