Solved

Huawei EchoLife HG520s pass-through VPN?

Posted on 2009-07-12
3
4,521 Views
Last Modified: 2013-12-14
Hi expert,

I would like to know whether the Echolife HG520s can pass through IPSec packets (UDP 500)?
Have already found and tested the port forwarding website but wan't able to make VPN connection:
http://portforward.com/english/routers/port_forwarding/Huawei/EchoLife-HG520s/Echolink.htm

Search the manufacturer website and look like this model does not support port fordwarding:
http://forum.huawei.com/jive4/thread.jspa?threadID=320885&tstart=100&orderStr=8

Are there anyone have the same problem? Any idea appreicate! Thank you.
0
Comment
Question by:FphcareEnginner
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Kerem ERSOY earned 500 total points
ID: 24836319
Hi,

I've checked the product manual. It does not mention about either VPN or IPSec pass through. IPsec protocol has two components. First of all it requires some IP packets (to be passed through) during the sending of AH phase. So it is not enough to pass UDP 500 packets.

You need a router that specifies it supports "IPSec Pass-trough" explicitly.  

Given that I don't think you can use IPSec passthrough with EchoLife HG520

Cheers,
K.
0
 
LVL 30

Assisted Solution

by:Kerem ERSOY
Kerem ERSOY earned 500 total points
ID: 24836364
I've also checked for DD-WRT which is an open source implementation of Wireless Access Points. But unfotunately your hardware is not supported at the moment.
0
 

Author Comment

by:FphcareEnginner
ID: 24843888
Hi Kerem,

Thank you for your advise.
I have tried the port forwarding again (http://portforward.com/english/routers/port_forwarding/Huawei/EchoLife-HG520s/Echolink.htm) and confirm it works on both physically and wireless.

However, it seems to reset itself (loss of network connectivity) every time when I try to connect to VPN either connected physically or wireless. Does that mean my VPN program sending IP packets and HG520s try to refuse them by reset?

For your information, my VPN client program is SafeNet SoftRemote 10.8.3.
Thank you for your help once again.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

    Over the past few years, small business and home owners have become so dependent on internet that a need for redundancy has arisen.    What happens when your small business or home / home office loses its internet connection?  The results c…
I've written this article to illustrate how we can implement a Dynamic Multipoint VPN (DMVPN) with both hub and spokes having a dynamically assigned non-broadcast multiple-access (NBMA) network IP (public IP). Here is the basic setup of DMVPN Pha…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now