Cisco Systems RVL200 Appendix N, Access of Multiple VLANs, Over a SSL VPN Tunnel, Static Route

Page 106

Appendix N

Access of Multiple VLANs over a SSL VPN Tunnel

 

Appendix N:

 

 

 

 

 

 

 

 

3. At the cmd prompt, enter the following:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Access of Multiple VLANs

route add <destination ip> mask 255.255.255.0

 

<gateway ip>

 

over a SSL VPN Tunnel

Example:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

route add 192.168.3.0 mask 255.255.255.0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Overview

 

 

 

 

 

 

 

 

192.168.1.201

 

 

 

 

 

 

 

 

 

4. Press the Enter key.

 

The 4-Port SSL/IPSec VPN Router (model number: RVL200)

Mac OS X

 

can allow a computer on the Internet to communicate with

 

a local computer, even though they belong to different

1. Click Finder.

 

Virtual Local Area Networks (VLANs).

 

2. Select Applications > Utilities > Terminal.

 

SSL VPN Connection

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3. Enter one of the following:

 

Establish an SSL VPN connection between the computer

sudo route add -net <destination ip> <gateway ip>

 

on the Internet, designated PC 1, and the RVL200. (Refer to

<subnet mask>

 

“Appendix B: Virtual Passage SSL VPN Client” for details.)

Example #1:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the configuration example,

the RVL200 assigns

sudo route add -net 192.168.3.0 192.168.1.201

 

192.168.1.201 to PC 1.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

255.255.255.0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

or

 

 

NOTE: By default, the SSLVPN client is a member

 

 

 

 

 

of default VLAN1.

 

 

 

 

 

 

 

 

sudo route add -net <destination network> <gateway

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ip>

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Example #2:

 

WAN

 

 

 

 

 

 

 

RVL200

sudo route add -net 192.168.3.0/24 192.168.1.201

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4. Press the Enter key.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Linux OS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Default VLAN1

Enter the following:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

route add -net <destination ip> netmask 255.255.255.0

192.168.1.201

 

 

 

 

 

 

 

 

 

 

 

 

 

gw <gateway ip>

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Example:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

route add -net 192.168.3.0 netmask 255.255.255.0 gw

 

 

 

 

 

VLAN2

 

 

 

 

 

 

 

 

192.168.1.201

 

 

 

 

 

192.168.3.201

 

 

 

 

 

SSL VPN Client Communicating with a Client Belonging to a

 

 

 

 

 

Different VLAN

 

 

 

 

 

 

 

 

 

Static Route

On the local computer, designated PC 2, configure a static route to access a member of a different VLAN.

Follow the instructions for the operating system of PC 2.

Windows Operating System (OS)

1.Click Start.

2.Select Programs > Accessories > Command Prompt.

4-Port SSL/IPSec VPN Router

98

Image 106
Contents Port SSL/IPSec VPN Router About This Guide About This GuideTable of Contents Ddns IPSec VPN Gateway to Gateway Appendix D Active Directory Server Appendix C Bandwidth ManagementAppendix E User for the Active Directory Server Appendix J IPSec NAT Traversal Appendix I Gateway-to-Gateway VPN TunnelAppendix L Multiple VLANs with Computers Appendix Q Specifications Appendix O Firmware UpgradeAppendix P Battery Replacement Appendix M Multiple VLANs and SubnetsIntroduction ChapterChapter Introduction Introduction to the RouterComputer using SSL VPN client software to VPN Router Front Panel Chapter Product OverviewProduct Overview Back PanelInstallation Chapter InstallationPhysical Installation Cable Connection Overview Chapter Advanced ConfigurationAdvanced Configuration Before You BeginHow to Access the Web-Based Utility Click Security Select Use SSL 2.0 and Use SSLSystem Summary System InformationIPSec VPN Setting Status Network Setting StatusFirewall Setting Status SSL VPN Setting StatusNetwork Setup Tab NetworkLAN Setting WAN Connection TypeStatic IP PPPoE Point-to-Point Protocol over EthernetSetup Password Pptp Point-to-Point Tunneling ProtocolPassword Setup TimeSetup DMZ Host TimePort Range Forwarding Setup Tab ForwardingForwarding Port TriggeringSetup UPnP UPnPSetup MAC Clone Setup One-to-One NATOne-to-One NAT MAC Clone Setup DdnsSetup Advanced Routing Advanced RoutingDhcp Setup Static RoutingDynamic IP SetupStatic IP Dhcp Multiple VLANs Dhcp StatusStatus Multiple VLANsDhcp Inter-VLAN Routing System Management DiagnosticDiagnostic Inter-VLAN RoutingSystem Management Restart Factory DefaultFirmware Upgrade Firmware DownloadSystem Management Port Mirroring Import Configuration FileExport Configuration File RestartPort Management Port Status Port Management Port SetupBasic Per Port Config Port StatusPort Management Create Vlan Port Management Port SettingPort Setting Create VlanVlan Membership QoS Bandwidth ManagementBandwidth Management Rate Control PriorityQoS Mode QoS QoS SetupQoS Setup Trust Mode Default CoSQueue Settings QoS Queue SettingsQoS Dscp Settings CoS SettingsGeneral Dscp SettingsFirewall General Dscp to QueueAccess Rules Firewall Access RulesRestrict WEB Features Add a New Access Rule ServicesScheduling Firewall Content FilterContent Filter IP/MAC GroupWebsite Blocking by Keywords IPSec VPN SummaryForbidden Domains IP AddressSummary Local Group SetupIPSec VPN Gateway to Gateway Add a New TunnelLocal Security Group Type Remote Group SetupRemote Security Gateway Type Remote Security Group Type IPSec Setup IKE with Preshared KeyAdvanced SSL VPN Certificate Management IPSec VPN VPN Pass ThroughSSL VPN Summary VPN Pass ThroughUser Management Authentication TypeSSL VPN User Management Edit GroupSSL VPN Virtual Passage Edit UserVirtual Passage Snmp Global ParametersGlobal Parameters Views Snmp ViewsSnmp Group Profile Group ProfileGroup Membership Snmp Group MembershipSnmp Communities CommunitiesSnmp Notification Recipient Notification RecipientLog System Log System LogAlert Log Log SettingLog System Statistics General LogBasic Setup WizardObtain an IP automatically PPPoEAccess Rule Setup Select the Service Manual SupportLogout Linksys Web SiteLogout Troubleshooting Appendix a TroubleshootingAppendix a Appendix B Virtual Passage SSL VPN Client Appendix BBefore You Begin Windows OS Make the SSL VPN Portal a Trusted Site Windows OS Click Trusted sitesInstallation of the Virtual Passage Client Windows OS Login for the SSL VPN Portal Windows OSWhen you right-click the icon, you have three options Click Continue AnywayLogin for the SSL VPN Portal Mac OS Installation of the Virtual Passage Client Mac OSWindows Vista Usage Removal of the Virtual Passage Client Mac OS Click ContinueLogin for the SSL VPN Portal Linux OS Installation of the Virtual Passage Client Linux OSBefore You Begin Linux OS Removal of the Virtual Passage Client Linux OS Appendix C Bandwidth Management Creation of New ServicesAppendix C Bandwidth ManagementClick Save Settings Creation of New Bandwidth Management RulesAppendix D Active Directory Server Appendix DActive Directory Server Select Domain in a new forest, and then click Next Enter a domain name, and then click Next Active Directory Server Troubleshooting Appendix E Appendix E User for the Active Directory ServerUser for the Active Directory Server Appendix F Internet Authentication Service IAS Server Appendix FInternet Authentication Service IAS Server Select Unencrypted authentication. Click Apply Click Finish Welcome to the New Connection Request Policy Wizard Click Edit Profile Appendix G Click the User Management tabAppendix H Deployment in an Existing Network Select HTTPSTCP/443~443 from the Service drop- down menuAppendix H LAN-to-LAN ConnectionWAN-to-LAN Connection Appendix Gateway-to-Gateway VPN Tunnel Configuration of the RVL200Appendix Click the Gateway to Gateway tabConfiguration of the RV082 Configuration of PC 1 and PCRV082 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix Appendix J Configuration of ScenarioConfiguration of Router a Appendix J IPSec NAT TraversalConfiguration of Router B IPSec NAT TraversalOne-to-One NAT Rule on NAT 2 RV042 One-to-One NAT Rule on NAT 1 RV042Configuration of Router a Appendix K Configuration of MultipleRVL200-to-RV042 Configuration Appendix KClick Save Setting RV042 #1 ConfigurationClick the Advanced Routing tab RV042 #2 Configuration Appendix L Multiple VLANs with Computers RVL200-to-SRW2048 ConfigurationAppendix L Click the Port Management tabSelect Enable Vlan SRW2048 ConfigurationClick Save Settings Click the Vlan Membership tab Appendix M RVL200 ConfigurationAppendix M Multiple VLANsInter-VLAN Routing Option Click the Inter-VLAN Routing tabAppendix N Access of Multiple VLANsAppendix N Over a SSL VPN TunnelFirmware Upgrade Appendix O Firmware UpgradeAppendix O Upgrade the Firmware Click the Firmware Upgrade tabReplace the Lithium Battery Appendix P Battery ReplacementBattery Replacement Appendix PSpecifications Appendix Q SpecificationsAppendix Q Limited Warranty Warranty InformationAppendix R Appendix S Regulatory InformationDansk Danish Miljøinformation for kunder i EU Port SSL/IPSec VPN Router 106 Norsk Norwegian Miljøinformasjon for kunder i EU Port SSL/IPSec VPN Router 108 Appendix T Contact Information