Cisco Systems WRV54G manual Vpn

Page 35

Wireless-G VPN Broadband Router

VPN

Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen, shown in Figure 6-17, allows you to configure your VPN settings to make your network more secure.

VPN PassThrough

IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enabled button. To disable IPSec Passthrough, click the Disabled button.

PPTP Pass Through. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enabled button. To disable PPTP Passthrough, click the Disabled button.

L2TP Pass Through. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by to enable the operation of a virtual private network (VPN) over the Internet.To allow L2TP Passthrough, click the Enabled button. To disable L2TP Passthrough, click the Disabled button.

VPN Tunnel

The VPN Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is secure.

To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is possible to create up to 100 simultaneous tunnels. Then click Enabled to enable the tunnel. Once the tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel.

Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that can access the tunnel. The Remote Secure Group is the computer (s) on the remote end of the tunnel that can access the tunnel. Enter the IP Address and Subnet Mask of the local VPN Router in the fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0).

Remote Security Gateway. The Remote Security Gateway is the VPN device, such as a second VPN Router, on the remote end of the VPN tunnel. Enter the IP Address of the VPN device at the other end of the tunnel. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The IP Address may either be static (permanent) or dynamic (changing), depending on the

Chapter 6: Configuring the Router

Figure 6-17: VPN

31

The Security Tab

Image 35
Contents 802 GHz .11g Wireless- G Word definition How to Use this GuideCopyright and Trademarks Table of Contents Frequently Asked Questions Wireless SecurityWelcome IntroductionWhat’s in this Guide? Wireless-G Broadband VPN Router What’s an IP Address? Planning your Wireless NetworkRouter’s Functions IP AddressesDynamic IP Addresses Why do I need a VPN?Dhcp Dynamic Host Configuration Protocol Servers What is a VPN? VPN Router to VPN Router Wireless-G VPN Broadband Router Back Panel Getting to Know the Wireless-G VPN Broadband RouterDMZ Front PanelOverview Connecting the Wireless-G Broadband RouterWireless Connection to a PC Wired Connection to a PCWireless-G VPN Broadband Router Configuring Windows 98 and Millennium PCs Configuring the PCsProperties Configuring Windows 2000 PCsConfiguring Windows XP PCs Wireless Configuring the RouterSetup Applications & Gaming Access RestrictionsAdministration SecurityInternet Setup How to Access the Web-based UtilitySetup Tab Basic Setup TabStatic Internet Connection Type Pptp Internet Connection Type Optional Settings Required by some ISPsNetwork Setup DynDNS.org Ddns TabAdvanced Routing MAC Address Clone Tab See FigureAdvanced Routing Tab MAC Clone10 Routing Table Static RoutingWireless Network Wireless TabBasic Wireless Settings See Figure WEP See Figure Wireless Security 13 Wireless Network Access Wireless Network Access See Figure15 Advanced Wireless Settings Advanced Wireless Settings See FigureFirewall Security TabVPN 18 Manual Key Management 19 Advanced VPN Tunnel Setup WEP Access Restriction Access Restrictions Tab23 Internet Filter Summary Port Range Forwarding Applications and Gaming Tab27 Port Triggering Port Triggering28 UPnP Forwarding UPnP ForwardingDMZ Management Administration TabRouter Password Syslog Notification LogUPnP Email AlertGeneral Log DiagnosticsNotification Queue Length Alert Log33 Factory Default WAN Connections StatusRouter Information36 Local Network Local NetworkSystem Performance 38 WirelessNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router TCP UDP Can’t get the Internet game, server, or application to work Firmware upgrade failed, and/or the Power LED is flashing To start over, I need to set the Router to factory defaultNeed to upgrade the firmware Power LED flashes continuously My DSL service’s PPPoE is always disconnectingDoes the Router support IPX or AppleTalk? Frequently Asked QuestionsWhere is the Router installed on the network? Is IPSec Pass-Through supported by the Router?Does the Router support ICQ send file? What is Network Address Translation and what is it used for?How can I block corrupted FTP downloads? How many ports can be simultaneously forwarded? What is DMZ Hosting?What are the advanced features of the Router? Is the Router cross-platform compatible?What is infrastructure mode? What is the Ieee 802.11g standard?What Ieee 802.11b features are supported? What is ad-hoc mode?What is WEP? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?Have excellent signal strength, but I cannot see my network How do I reset the Router?How do I resolve issues with signal loss? What Are The Risks? Appendix B Wireless SecurityBrief Overview Jamming Attacks Passive AttacksMan-in-the-Middle Attacks Maximizing Wireless SecurityActive Attacks Dictionary-Building or Table Attacks5SSID 8WEP Wireless-G VPN Broadband Router Figure B-2 WEP 4GHz/802.11b and 802.11g WEP EncryptionWRV54G EnvironmentFilter List 1 win-router How to Establish a Secure IPSec TunnelCreate an IPSec Policy Build Filter ListsFigure C-4 IP Filter List Filter List 2 router-winFigure C-7 IP Filter List Tunnel 1 win-router Configure Individual Tunnel RulesFigure C-13 Authentication Methods Tunnel 2 router-win Figure C-16 Tunnel Setting TabFigure C-19 IP Filter List Tab Figure C-22 Preshared Key Figure C-25 Connection Type Assign New IPSec PolicyFigure C-28 VPN Tab Create a Tunnel Through the Web-Based UtilityWindows 98 or Me Instructions Figure D-1 IP Configuration ScreenFigure D-3 MAC Address/Physical Address Windows 2000 or XP InstructionsAppendix E Snmp Functions Appendix F Upgrading Firmware Figure F-1 Upgrade FirmwareNetwork Neighborhood/My Network Places Appendix G Windows HelpShared Resources Appendix H Glossary Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Up to 54Mbps wireless, up to 100 Mbps LAN Appendix I SpecificationsTransmit Power 19dBm LEDs FCC Statement Appendix J Regulatory InformationFCC Part 68 Statement Safety Notices Limited Warranty Appendix K Warranty InformationAppendix L Contact Information