Linksys BEFSX41 manual Instant Broadband Series

Page 27

Instant Broadband® Series

The Inbound SPI and Outbound SPI fields are different, however. The Inbound SPI value set here must match the Outbound SPI value at the other end of the tunnel. The Outbound SPI here must match the Inbound SPI value at the other end of the tunnel. In the example (see Figure7-21), the Inbound SPI and Outbound SPI values shown would be opposite on the other end of the tunnel. Only numbers can be used in these fields. After you click the Apply button, hexadecimal characters (series of letters and numbers) are displayed in the Inbound SPI and Outbound SPI fields.

Figure 7-21

Once you are satisfied with all your settings, click the Apply button. If you make any mistakes, clicking the Cancel button will exit the screen without sav- ing any changes, provided that you have not already clicked the Apply button.

After the VPN device is set up at the other end of the tunnel, you may click the Connect button to use the tunnel. This assumes that both ends of the tunnel have a physical connection to each other (e.g., over the Internet, physical wiring, etc.). After clicking the Connect button, click the Summary button. If the connection is made, the screen shown in Figure 7-22 will appear:

Figure 7-22

EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint

Figure 7-23

On the VPN screen, the word Connected should appear beside Status if the connection is successful. The other fields reflect the information that you entered on the VPN screen to make the connection.

If Disconnected appears under Status, as shown in Figure 7-23, some problem exists that prevents the creation of the tunnel. Make sure that all of your wiring is securely connected. Double-check all the values you entered on the VPN screen to make sure they are correct. If the other end of the tunnel is some dis- tance from you (e.g., in another city, etc.), call to make sure that the settings on that end of the tunnel are correct as well.

If, for any reason, you experience a temporary disconnection, the connection will be re-established as long as the settings on both ends of the tunnel stay the same.

46

47

Image 27
Contents User Guide Copyright & Trademarks Table of Contents Features IntroductionEnvironmental 139 IP Addresses An Introduction to LANs and WANsNetwork Setup Overview Why Do I Need a VPN?Your Virtual Private Network VPN Firewall Router to Firewall Router What is a Virtual Private Network?Ports PowerRouter’s Back Panel Modem connection will not work from any other portWAN and LAN LEDs Router’s Front Panel LEDsProceed to Connect the Router Overview Connecting Your Hardware Together and Booting UpRouter’s hardware installation is now complete Connect the RouterConfiguring Windows 95, 98, and Millennium PCs Configure the PCsConfiguring Windows 2000 PCs Go to Configure the RouterConfiguring Windows XP PCs Configure the Router Enter the Gateway Address Obtain an IP Address AutomaticallyStatic IP Address Advanced Proxies. Click Direct Connection to the InternetRAS PPPoECable/DSL Firewall Router’s Web-based Utility Quick and Easy Router AdministrationSetup Static IP User Name and PasswordWAN IP Firewall IPSec Pass Through Remote UpgradeBlock WAN Request Multicast Pass ThroughVPN Establishing a TunnelLocal Secure Group and Remote Secure Group Remote Security Gateway Authentication EncryptionKey Management Instant Broadband Series Phase Advanced Settings for Selected IPSec TunnelPassword Other SettingsStatus Dhcp Log Help Filters AdvancedInstant Broadband Series Forwarding UPnP Forwarding Port Triggering Static Routing Dynamic RoutingDMZ Host DMZ PortDMZ Host Address MAC Address Clone Current DMZ HostDdns DynDNS.orgAppendix a Troubleshooting Common Problems and SolutionsTZO.com For Windows NT For Windows XPFor Windows 95, 98, and Me For Windows XP Am not able to access the Router’s web interface Setup Can’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to use port triggering Click the Advanced = Filter tabFrequently Asked Questions TCP/IP is compatible with the Router Appendix B Maximizing VPN Security Step One Create an IPSec Policy IntroductionEnvironment Windows 2000 or Windows XPFilter List 1 win-router Step Two Build Filter ListsIP Address Figure C-6 Filter List 2 router=winTunnel 1 win-router Step Three Configure Individual Tunnel RulesAccept Respond Using IPSec XYZ12345. ClickString to Protect Negotiate Security Key exchange pre Shared key, as shownTunnel 2 router-win XYZ12345 Action Require Security This string to protectKey Exchange Preshared key,Step Four Assign New IPSec Policy Figure C-24Figure C-28 Step Five Create a Tunnel Through the Web-based UtilityAppendix D Snmp Functions Appendix E How to Ping Your ISP’s E-mail & Web AddressesFigure E-1 TCP/IP installation is now complete Appendix F Installing the TCP/IP ProtocolFor Windows NT, 2000, and XP Figure G-1Figure G-5 Appendix H Glossary 129 131 133 135 137 Environmental Appendix I SpecificationsWeb FTP Site Appendix J Warranty InformationAppendix K Contact Information Sales InformationCopyright 2003 Linksys, All Rights Reserved