Linksys WRV200 manual Assign New IPSec Policy, Create a Tunnel Through the Web-Based Utility

Page 53

Appendix D

Configuring IPSec with a Windows 2000 or XP Computer

Step 4: Assign New IPSec Policy

In the IP Security Policies on Local Machine window, right- click the policy named to_Router, and click Assign. A green arrow appears in the folder icon.

Local Computer

Step 5: Create a Tunnel Through the Web-Based Utility

1.Open your web browser, and enter 192.168.1.1 in the Address field. Press Enter.

2.When the User name and Password fields appear, enter the default user name and password, admin. Press Enter.

3.Click the VPN tab, then click IPSec VPN.

VPN > IPSec VPN

4.Select the tunnel you wish to create in the Select Tunnel Entry drop-down box. Then click Enabled next to the VPN Tunnel option. Enter the name of the tunnel in

the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. Set the NAT- Traversal option to Disabled.

5.Enter the IP Address and Subnet Mask of the local VPN Router in the Local Secure Group fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0).

6.Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Secure Group fields.

7.Select the Key Management.

a.Select Auto (IKE), then set the Operation Mode to Main.

b.Select the ISAKMP encryption method: 3DES, AES- 128, AES-192, or AES-256. The method you select must be the same type of encryption that is being used by the VPN device at the other end of the tunnel.

c.Select the ISAKMP authentication method: MD5 or SHA1 (SHA1 is recommended as it is more secure). As with encryption, the method you select must be the same type of authentication used by the VPN device at the other end of the tunnel.

d.Select the ISAKMP DH Group: 1024, 1536, 2048, 3072, 4096, 6144, or 8192. These represent different bits used in Diffie-Hellman mode operation.

e.In the ISAKMP Key Lifetime field, enter a time period in seconds to have the key expire at the end of the designated period, or leave the field blank for the key to last indefinitely.

f.Select PFS (Perfect Forward Secrecy) to ensure that the initial key exchange and IKE proposals are secure.

g.For IPSec, specify the Encryption Method, Authentication Method, DH Group, and Key Lifetime in the same manner as for ISAKMP above.

h.Enter a series of numbers or letters in the Pre- shared Key field. You may use any combination of up to 24 numbers or letters in this field. No special characters or spaces are allowed.

8.Click Save Settings to save these changes.

Your tunnel should now be established.

Wireless-G VPN Router with RangeBooster

48

Image 53
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix J Contact Information Appendix E Gateway-to-Gateway VPN TunnelAppendix I Regulatory Information Introduction ChapterAd-Hoc versus Infrastructure Mode Chapter Planning Your Wireless NetworkNetwork Topology Network LayoutChapter Planning Your Virtual Private Network VPN Why do I need a VPN?What is a VPN? VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterProduct Overview Chapter Product OverviewFront Panel Back PanelOverview Chapter Configuring the Wireless-G VPN RouterSetup How to Access the Web-based UtilitySetup Basic Settings Internet SetupPptp LAN Setup Optional Settings Required by some ISPsTime Settings Setup VlanSetup Ddns Ddns Setup MAC Address CloneStatic Routing Setup Advanced RoutingDynamic Routing Wireless Basic Wireless Settings WirelessWireless Wireless Security Wireless Network ModeWPA2 Enterprise WPA2 PersonalWPA Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessAdvanced Wireless Settings Wireless Advanced Wireless SettingsWireless WDS Firewall General FirewallFirewall Port Forwarding Internet BlockFirewall DMZ Firewall Port TriggeringFirewall URL Filtering Firewall Access RestrictionVPN VPN Client Access Certificate Management VPN VPN PassthroughVPN Client List Table Remote Secure Group VPN IPSec VPNLocal Secure Group Tunnel Options Remote Secure GatewayKey Management VPN VPN Summary QoS Application-Based QoS QoSQoS Port-Based QoS Priority QueueAdministration Management AdministrationAdmin Password Local Router AccessUPnP Administration LogBackup and Restore Administration Factory Default Administration DiagnosticsAdministration Firmware Upgrade Ping TestStatus Administration RebootStatus Router InformationStatus Local Network Status WirelessStatus System Performance Local NetworkVPN Summary Status VPN ClientsSystem Performance Troubleshooting Appendix a TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? Wireless Security Checklist Appendix B Wireless Security ChecklistAppendix B General Network Security GuidelinesAppendix C Installing from the CD-ROMAppendix C Overview Before You BeginVersion Number of the QuickVPN Client Using the Linksys QuickVPN Software\Program Files\Linksys\QuickVPN Client\ Select VPN, then VPN Client AccessDistributing Certificates to QuickVPN Users Introduction Appendix DEnvironment Create an IPSec PolicyFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Your tunnel should now be established Assign New IPSec PolicyCreate a Tunnel Through the Web-Based Utility Appendix E Configuration of the WRV200Appendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNClick the Gateway to Gateway tab Configuration of the RV082Configuration of PC 1 and PC RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Glossary Appendix FGlossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Appendix G SpecificationsSpecifications Specifications Obtaining Warranty Service Warranty InformationAppendix H Exclusions and LimitationsTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb