Linksys WRV200 manual VPN IPSec VPN, Local Secure Group, Remote Secure Group

Page 27

Chapter 5

Configuring the Wireless-G Router

PPTP PassThrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. PPTP Passthrough is enabled by default. To disable it, select Disabled.

L2TP PassThrough  Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. L2TP Passthrough is enabled by default. To disable L2TP Passthrough, select Disabled.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

VPN > IPSec VPN

The VPN > IPSec VPN screen is used to create and configure a Virtual Private Network (VPN) tunnel.

VPN > IPSec VPN

Tunnel Entry  To create a new tunnel, select new. To configure an existing tunnel, select it from the drop-down menu.

VPN Tunnel  Check the Enabled option to enable this tunnel.

Tunnel Name  Enter a name for this tunnel, such as “Anaheim Office”.

NAT-Traversal You can enable NAT-Traversal to support the remote IPSec peer operating behind a NAT device. To enable NAT traversal, check the Enabled option. If NAT

traversal is enabled, the Remote Secure Group and Remote Secure Gateway must be set to Any.

Advanced Settings  To define allowable remote private networks, click Advanced Settings. A screen appears with the following settings.

Allowable Remote Private Networks  You can select Allow All to allow the peer to sit in any private network that is behind a NAT, or By Manual Setting to indicate designated private networks manually.

Manual Setting  Enter the IP Address and Mask of what you want to accept that remote peer sat behind NAT. Click the checkbox and then click Save Settings to save and enable your new configuration.

NAT Traversal Advanced Settings

Local Secure Group

The Local Secure Group is the computer(s) on your LAN that can access the tunnel.

Type  From the drop-down menu, select Subnet, to include the entire network for the tunnel; select IP Address if you want a specific computer; or select Host, which is used with Port Forwarding to direct the traffic to the correct computer. The screen will change depending on the selected option. The options are described below.

Subnet  Enter the IP Address and Mask of the local VPN Router in the fields provided. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g., 192.168.1.0).

IP Addr.  Enter the IP Address of the local VPN Router. The Mask will be displayed.

Host  The VPN tunnel will terminate at the router with this setting. Use Port Range Forwarding to direct traffic to the correct computer. Refer to the Firewall > Port Range Forwarding screen.

Remote Secure Group

The Remote Secure Group is the computer(s) on the remote end of the tunnel that can access the tunnel.

Type  From the drop-down menu, select Subnet, to include the entire network for the tunnel; select IP address if you want a specific computer; select Host, if

Wireless-G VPN Router with RangeBooster

22

Image 27
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix E Gateway-to-Gateway VPN Tunnel Appendix I Regulatory InformationAppendix J Contact Information Introduction ChapterNetwork Layout Chapter Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyWhy do I need a VPN? What is a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterBack Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter Configuring the Wireless-G VPN RouterInternet Setup How to Access the Web-based UtilitySetup Setup Basic SettingsPptp LAN Setup Optional Settings Required by some ISPsSetup Vlan Setup DdnsTime Settings Ddns Setup MAC Address CloneSetup Advanced Routing Dynamic RoutingStatic Routing Wireless Network Mode WirelessWireless Basic Wireless Settings Wireless Wireless SecurityWPA2 Personal WPA EnterpriseWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessWireless Advanced Wireless Settings Wireless WDSAdvanced Wireless Settings Internet Block FirewallFirewall General Firewall Port ForwardingFirewall DMZ Firewall Port TriggeringFirewall Access Restriction VPN VPN Client AccessFirewall URL Filtering VPN VPN Passthrough VPN Client List TableCertificate Management VPN IPSec VPN Local Secure GroupRemote Secure Group Remote Secure Gateway Key ManagementTunnel Options VPN VPN Summary Priority Queue QoSQoS Application-Based QoS QoS Port-Based QoSLocal Router Access AdministrationAdministration Management Admin PasswordAdministration Log Backup and RestoreUPnP Ping Test Administration DiagnosticsAdministration Factory Default Administration Firmware UpgradeInformation Administration RebootStatus Status RouterLocal Network Status WirelessStatus Local Network Status System PerformanceStatus VPN Clients System PerformanceVPN Summary Windows Appendix a TroubleshootingTroubleshooting Appendix aTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? General Network Security Guidelines Appendix B Wireless Security ChecklistWireless Security Checklist Appendix BOverview Before You Begin Installing from the CD-ROMAppendix C Appendix CVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareSelect VPN, then VPN Client Access Distributing Certificates to QuickVPN Users\Program Files\Linksys\QuickVPN Client\ Create an IPSec Policy Appendix DIntroduction EnvironmentFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Assign New IPSec Policy Create a Tunnel Through the Web-Based UtilityYour tunnel should now be established Click IPSec VPN Configuration of the WRV200Appendix E Appendix E Gateway-to-Gateway VPN TunnelConfiguration of the RV082 Configuration of PC 1 and PCClick the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Http HyperText Transport Protocol Appendix FAppendix F Glossary GlossarySmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Specifications SpecificationsAppendix G Specifications Exclusions and Limitations Warranty InformationObtaining Warranty Service Appendix HTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb