Linksys WRV200 manual Rules Tab

Page 52

Appendix D

Configuring IPSec with a Windows 2000 or XP Computer

 

 

 

 

 

 

 

 

 

 

 

 

Filter Action Tab

12.Click the Authentication Methods tab, and verify that the authentication method Kerberos is selected. Then, click Edit.

Authentication Methods Tab

13.Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345. (This is a sample key string. Yours should be a key that is unique but easy to remember.) Then click OK.

Preshared Key

14.This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step.

Wireless-G VPN Router with RangeBooster

New Preshared Key

15.Click the Tunnel Setting tab. Click the radio button The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer’s IP Address.

Tunnel Setting Tab

16.Click the Connection Type tab, and select All network connections. Then click OK or Close to finish.

Connection Type Tab

17.On the Rules tab, click the OK or Close button to return to the screen showing the security policies.

Rules Tab

47

Image 52
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless Security ChecklistAppendix I Regulatory Information Appendix E Gateway-to-Gateway VPN TunnelAppendix J Contact Information Chapter IntroductionChapter Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Network LayoutWhat is a VPN? Why do I need a VPN?Chapter Planning Your Virtual Private Network VPN Computer using the Linksys VPN client software to VPN Router VPN Router to VPN RouterChapter Product Overview Product OverviewFront Panel Back PanelChapter Configuring the Wireless-G VPN Router OverviewHow to Access the Web-based Utility SetupSetup Basic Settings Internet SetupPptp Optional Settings Required by some ISPs LAN SetupSetup Ddns Setup VlanTime Settings Setup MAC Address Clone DdnsDynamic Routing Setup Advanced RoutingStatic Routing Wireless Wireless Basic Wireless SettingsWireless Wireless Security Wireless Network ModeWPA Enterprise WPA2 PersonalWPA2 Enterprise WPA2 Personal Mixed WPA2 Enterprise MixedWireless Wireless Network Access Wireless Network AccessWireless WDS Wireless Advanced Wireless SettingsAdvanced Wireless Settings Firewall Firewall GeneralFirewall Port Forwarding Internet BlockFirewall Port Triggering Firewall DMZVPN VPN Client Access Firewall Access RestrictionFirewall URL Filtering VPN Client List Table VPN VPN PassthroughCertificate Management Local Secure Group VPN IPSec VPNRemote Secure Group Key Management Remote Secure GatewayTunnel Options VPN VPN Summary QoS QoS Application-Based QoSQoS Port-Based QoS Priority QueueAdministration Administration ManagementAdmin Password Local Router AccessBackup and Restore Administration LogUPnP Administration Diagnostics Administration Factory DefaultAdministration Firmware Upgrade Ping TestAdministration Reboot StatusStatus Router InformationStatus Wireless Status Local NetworkStatus System Performance Local NetworkSystem Performance Status VPN ClientsVPN Summary Appendix a Troubleshooting TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Click Save Settings Go to the Firewall DMZ tabGo to the Setup Basic Setup tab Click the Firewall Port Triggering tabFrequently Asked Questions WRV200 does not support NetBIOS Broadcast overIs the Router cross-platform compatible? Appendix B Wireless Security Checklist Wireless Security ChecklistAppendix B General Network Security GuidelinesInstalling from the CD-ROM Appendix CAppendix C Overview Before You BeginUsing the Linksys QuickVPN Software Version Number of the QuickVPN ClientDistributing Certificates to QuickVPN Users Select VPN, then VPN Client Access\Program Files\Linksys\QuickVPN Client\ Appendix D IntroductionEnvironment Create an IPSec Policy Filter List 2 router win Configure Individual Tunnel Rules Tunnel 1 win-RouterTunnel 2 Router-win Rules Tab Create a Tunnel Through the Web-Based Utility Assign New IPSec PolicyYour tunnel should now be established Configuration of the WRV200 Appendix EAppendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNConfiguration of PC 1 and PC Configuration of the RV082Click the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Appendix F GlossaryGlossary Http HyperText Transport ProtocolGlossary Smtp Simple Mail Transfer Protocol The standard eAppendix F Specifications Appendix G SpecificationsAppendix G Specifications Warranty Information Obtaining Warranty ServiceAppendix H Exclusions and LimitationsWarranty Information Technical SupportAppendix Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Appendix J Contact Information
Related manuals
Manual 2 pages 11.27 Kb