Cisco Systems RV042RF manual IPSec Setup, Default is Domain NameFQDN

Page 51

Chapter 4

Advanced Configuration

NOTE: The Local Security Group Type you select should match the Remote Security Group Type selected on the remote computer at the other end of the tunnel.

After you have selected the Local Security Group Type, the settings available on this screen may change, depending on which selection you have made.

IP

Only the computer with a specific IP address will be able to access the tunnel.

Local Security Group Type > IP

IP address  Enter the appropriate IP address. The default IP is 192.168.1.0.

Subnet

The default is Subnet. All computers on the local subnet will be able to access the tunnel.

Local Security Group Type > Subnet

IP address  Enter the IP address. The default is 192.168.1.0.

Subnet Mask  Enter the subnet mask. The default is 255.255.255.0.

IP Range

Specify a range of IP addresses within a subnet that will be able to access the tunnel.

Local Security Group Type > IP Range

IP range  Enter the range of IP addresses. The default is 192.168.1.0~254.

Remote Client Setup

Remote Client

Select the type you want to use: Domain Name(FQDN), E-mail Addr.(USER FQDN), or Microsoft XP/2000 VPN Client. Follow the instructions for the type you want to use.

Domain Name(FQDN)

The default is Domain Name(FQDN).

Remote Client > Domain Name(FQDN)

Domain Name  Enter the Fully Qualified Domain Name (FQDN), which is the host name and domain name for a specific computer on the Internet. When the remote computer requests to create a tunnel with the Router, the Router will work as a responder.

E-mail Address(UserFQDN)

Remote Client > E-mail Address(UserFQDN)

E-mail address  Enter the e-mail address of the user FQDN.

Microsoft XP/2000 VPN Client

Dynamic IP users, such as PPPoE or DHCP users, who use the Microsoft VPN client software, can use this option. (The Microsoft VPN client software does not support Aggressive mode and FQDN or User FQDN ID options.)

Remote Client > Microsoft XP/2000 VPN Client

IPSec Setup

In order for any encryption to occur, the two ends of a VPN tunnel must agree on the methods of encryption, decryption, and authentication. This is done by sharing a key to the encryption code. For key management, the default mode is IKE with Preshared Key.

Keying Mode  Select IKE with Preshared Key or Manual. Both ends of a VPN tunnel must use the same mode of key management. After you have selected the mode, the settings available on this screen may change, depending on the selection you have made. Follow the instructions for the mode you want to use. (Manual mode is available for VPN tunnels only, not group VPNs.)

IKE with Preshared Key

IKE is an Internet Key Exchange protocol used to negotiate key material for Security Association (SA). IKE uses the Preshared Key to authenticate the remote IKE peer.

Phase 1 DH Group  Phase 1 is used to create the SA. DH (Diffie-Hellman) is a key exchange protocol used during Phase 1 of the authentication process to establish pre-

10/100 4-Port VPN Router

44

Image 51
Contents 10/100 4-Port VPN Router Online Resources About This GuideAbout This Guide Icon DescriptionsTable of Contents Ddns Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Appendix a TroubleshootingAppendix D IPSec NAT Traversal Appendix F Firmware UpgradeAppendix H Specifications Appendix G Trend Micro ProtectLink Gateway ServiceAppendix I Warranty Information Appendix K Regulatory InformationAppendix L Contact Information Chapter Chapter IntroductionIntroduction Computer using VPN client software to VPN Router Product Overview Chapter Product OverviewCable Connections Chapter InstallationInstallation Physical InstallationInstallation Overview Chapter Advanced ConfigurationAdvanced Configuration How to Access the Web-Based UtilityTrend Micro ProtectLink Gateway ConfigurationSystem Information Port StatisticsLog Setting Status Network Setting StatusFirewall Setting Status VPN Setting StatusSetup Tab Network LAN SettingNetwork WAN Connection Type Dual-WAN/DMZ SettingPptp Point-to-Point Tunneling Protocol PPPoE Point-to-Point Protocol over EthernetHeart Beat Signal Setup PasswordTime Setup TimeSetup DMZ Host PasswordPort Triggering Setup Tab ForwardingForwarding Port Range ForwardingUPnP Setup UPnPAdd Range Setup One-to-One NATSetup MAC Clone One-to-One NATDynDNS.org Setup DdnsMAC Clone WAN1/2Oray.net PeanutHull Ddns Setup Advanced RoutingAdvanced Routing Dynamic RoutingStatic Routing Dhcp SetupSetup Dynamic IPStatic IP Dual-WAN Smart Link BackupDhcp Status StatusLoad Balance Network Service DetectionSystem Management Bandwidth Management Bandwidth WAN1/2Protocol Binding Rate Control Bandwidth ManagementMaximum Bandwidth provided by ISP Bandwidth Management TypePriority System Management SnmpPing System Management DiagnosticDiagnostic DNS Name LookupFirmware Download Factory DefaultFirmware Upgrade System Management RestartBasic Per Port Config Port Management Port SetupImport Configuration File Export Configuration FileGeneral Port Management Port StatusFirewall General Port StatusRestrict WEB Features Firewall Access RulesAccess Rules Add a New Access RuleServices Scheduling Firewall Content FilterSummary Content FilterProtectLink VPN SummaryGroupVPN Status Gateway to GatewayClient to Gateway VPN Clients Status Local Group SetupVPN Gateway to Gateway Add a New TunnelLocal Security Group Type Remote Security Gateway Type Remote Group SetupIPSec Setup IKE with Preshared KeyRemote Security Group Type Keying Mode Manual Advanced VPN Client to GatewayTunnel No The tunnel number is automatically generated TunnelRemote Client Remote Client SetupGroup VPN Default is Domain NameFQDN Keying Mode Manual Tunnel Only VPN VPN Client Access Certificate Management VPN Client AccessVPN VPN Pass Through VPN Client UsersPptp Server VPN Pptp ServerLog System Log VPN Pass ThroughMail Log SettingSystem Log SyslogLog System Statistics Wizard Basic SetupObtain an IP automatically Minutes PPPoEAccess Rule Setup Select the Log Rule Linksys Web Site SupportLogout ManualAppendix a Troubleshooting TroubleshootingAppendix a Windows 2000, XP, or Vista Appendix BAppendix B Linksys QuickVPN forClick Add to list Click Save Settings Linksys QuickVPN Client Installation and ConfigurationInstall from the CD-ROM Click the VPN Client Access tabLinksys QuickVPN Connection Install the Client CertificateClick Business Click Router/VPN Solutions Download from the InternetVersion Number of Linksys QuickVPN Confirm New Password Re-enter your new passwordBefore You Begin Configuration of the RVL200Appendix C Appendix C Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV042RV042 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix C Appendix D IPSec NAT Traversal Configuration of ScenarioConfiguration of Router a Appendix DIPSec NAT Traversal Configuration of Router BOne-to-One NAT Rule on NAT 2 RV042 One-to-One NAT Rule on NAT 1 RV042Click the One-to-One NAT tab Configuration of Router a Appendix D Bandwidth Management Creation of New ServicesAppendix E Appendix E Bandwidth ManagementCreation of New Bandwidth Management Rules Alternative Firmware Upgrade Option Appendix F Firmware UpgradeFirmware Upgrade Upgrade the FirmwareFirmware Upgrade System Summary Appendix G Trend Micro ProtectLink Gateway ServiceHow to Purchase, Register, or Activate the Service Appendix GProtectLink How to Use the ServiceWeb Protection ProtectLink Web ProtectionLicense ProtectLink Email ProtectionProtectLink License Email ProtectionAppendix G Appendix H Specifications SpecificationsAppendix H Exclusions and Limitations Warranty InformationObtaining Warranty Service AppendixTechnical Support Warranty InformationSoftware Licenses Appendix JAppendix J Software License Agreement Software in Linksys ProductsSoftware License Agreement SchedulePreamble Appendix J END of Terms and Conditions Original SSLeay License OpenSSL LicenseAppendix J Regulatory Information Appendix KDansk Danish Miljøinformation for kunder i EU Appendix K Norsk Norwegian Miljøinformasjon for kunder i EU Appendix K Contact Information Appendix L