Linksys WRV200 manual VPN VPN Summary

Page 29

Chapter 5

Configuring the Wireless-G Router

DPD will issue DPD packets (ISAKMP format) to query a remote peer, and wait for a reply to recognize that it is still alive. There are 3 auxiliary options: Detection Delay(s), Detection Timeout(s), and DPD Action for DPD.

Detection Delay(s)  You can indicate the interval between DPD query packets. The default value is 30 seconds.

Detection Timeout(s)  You can indicate the length of timeout when DPD cannot hear any DPD reply. The default value is 120 seconds.

DPD Action  When DPDTimeout expires, the DPD will take DPD Action to deal with the connection. You can select Wait for Response to still wait for remote peer response, or select Suspend Connection to stop passively recovering the connection or select Recover Connection.

If IKE failed more than _times, block this unauthorized IP for _ seconds  This feature is enabled by default. It enables the Router to block unauthorized IP addresses. Specify the number of times IKE must fail before the Router blocks that unauthorized IP address.

Anti-replay This protects the Router from anti-replay attacks, when people try to capture your authentication packets in an attempt to gain access. The feature is enabled by default.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

VPN > VPN Summary

VPN > VPN Summary

This page summarizes the comprehensive details of IPSec VPN Tunnels that include Tunnel Name, Remote Gateway, Remote Group, Local Group, Key Methods, Tunnel Status, and Start/Stop/Detail Connection. Each field displays information according to a pre-configured value of IPSec tunnel separately, and each IPSec tunnel can be easily

commanded to start/stop connection here. VPN Summary can help an administrator to manage and examine all IPSec tunnels status.

Tunnel Name  The field displays the name of the tunnel.

Remote Gateway  The field displays the remote gateway. If the pre-configured type is IP Addr., the field displays the IP address of remote gateway. If the pre-configured type of remote gateway is Any, the field displays ANY. If the pre-configured type is FQDN, the field displays the FQDN string directly.

Remote Group  The field displays the remote peer that is designated for VPN communication after a IPSec VPN tunnel is established. If the pre-configured type of the remote group is IP Addr., the field displays the IP address of the remote peer. If the pre-configured type of the remote group is Subnet, the field displays the subnet type “IP Address/Mask”. If the pre-configured type of remote group is Host or Any, the field displays the “Host” or “Any” directly.

Local Group  The field displays the local peer that is designated for VPN communication after an IPSec VPN tunnel is established. If the pre-configured type of local group is IP Addr., the field displays the IP address of the local peer. If the pre-configured type of local group is Subnet, the field displays the subnet type “IP Address/ Mask”. If the pre-configured type of local group is Host, the field displays the “Host” directly.

Key Methods  The field displays the IPSec authentication and encryption key methods of the Key exchange Method that is followed with the setting value of the Password Forward Secrecy.

Tunnel Status  The field displays the status of IPSec Tunnel as follows.

C  The Tunnel is Connected.

T  Try to Connect to Remote Peer.

Stop  The Tunnel is Stopped.

D  The Tunnel is Disabled.

Any  The Tunnel always waits for the connection from the remote initiator.

NAT-T The Tunnel enables the NAT-Traversal to allow the remote initiator that is behind the NAT to construct this IPSec Tunnel.

Start/Stop/Restart Connection  You can manually start/ stop IPSec connection according to pre-configured tunnel settings. If the pre-configured type of remote gateway or remote group is either Any or NAT-Traversal, the Detail button can also examine Remote Security Gateway information.

Wireless-G VPN Router with RangeBooster

24

Image 29
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix J Contact Information Appendix E Gateway-to-Gateway VPN TunnelAppendix I Regulatory Information Introduction ChapterAd-Hoc versus Infrastructure Mode Chapter Planning Your Wireless NetworkNetwork Topology Network LayoutChapter Planning Your Virtual Private Network VPN Why do I need a VPN?What is a VPN? VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterProduct Overview Chapter Product OverviewFront Panel Back PanelOverview Chapter Configuring the Wireless-G VPN RouterSetup How to Access the Web-based UtilitySetup Basic Settings Internet SetupPptp LAN Setup Optional Settings Required by some ISPsTime Settings Setup VlanSetup Ddns Ddns Setup MAC Address CloneStatic Routing Setup Advanced RoutingDynamic Routing Wireless Basic Wireless Settings WirelessWireless Wireless Security Wireless Network ModeWPA2 Enterprise WPA2 PersonalWPA Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessAdvanced Wireless Settings Wireless Advanced Wireless SettingsWireless WDS Firewall General FirewallFirewall Port Forwarding Internet BlockFirewall DMZ Firewall Port TriggeringFirewall URL Filtering Firewall Access RestrictionVPN VPN Client Access Certificate Management VPN VPN PassthroughVPN Client List Table Remote Secure Group VPN IPSec VPNLocal Secure Group Tunnel Options Remote Secure GatewayKey Management VPN VPN Summary QoS Application-Based QoS QoSQoS Port-Based QoS Priority QueueAdministration Management AdministrationAdmin Password Local Router AccessUPnP Administration LogBackup and Restore Administration Factory Default Administration DiagnosticsAdministration Firmware Upgrade Ping TestStatus Administration RebootStatus Router InformationStatus Local Network Status WirelessStatus System Performance Local NetworkVPN Summary Status VPN ClientsSystem Performance Troubleshooting Appendix a TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? Wireless Security Checklist Appendix B Wireless Security ChecklistAppendix B General Network Security GuidelinesAppendix C Installing from the CD-ROMAppendix C Overview Before You BeginVersion Number of the QuickVPN Client Using the Linksys QuickVPN Software\Program Files\Linksys\QuickVPN Client\ Select VPN, then VPN Client AccessDistributing Certificates to QuickVPN Users Introduction Appendix DEnvironment Create an IPSec PolicyFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Your tunnel should now be established Assign New IPSec PolicyCreate a Tunnel Through the Web-Based Utility Appendix E Configuration of the WRV200Appendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNClick the Gateway to Gateway tab Configuration of the RV082Configuration of PC 1 and PC RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Glossary Appendix FGlossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Appendix G SpecificationsSpecifications Specifications Obtaining Warranty Service Warranty InformationAppendix H Exclusions and LimitationsTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb