Configuring Vpn Policies - Cisco RV120W Administration Manual

Wireless-n vpn firewall
Hide thumbs Also See for RV120W:
Table of Contents

Advertisement

Configuring Virtual Private Networks (VPNs) and Security
Configuring Advanced VPN Parameters
STEP 1
STEP 2
STEP 1
STEP 2
STEP 3
STEP 4
Cisco RV120W Administration Guide
Extended Authentication (XAUTH) Parameters
Rather than configuring a unique VPN policy for each user, you can enable the VPN
gateway router to authenticate users from a stored list of user accounts or with an
external authentication server such as a RADIUS server. When connecting many
VPN clients to a VPN gateway router, Extended Authentication (XAUTH) allows
authentication of users with methods in addition to the authentication method
mentioned in the IKE SA parameters. XAUTH can be configured in the following
modes:
Select the XAUTH type:
None—Disables XAUTH.
Edge Device—Authentication is done by one of the following:
-
User Database—User accounts created in the router are used to
authenticate users. See
-
RADIUS-PAP—Authentication is done using a RADIUS server and
password authentication protocol (PAP).
-
RADIUS-CHAP—Authentication is done using a RADIUS server and
challenge handshake authentication protocol (CHAP).
IPsec Host—The router is authenticated by a remote gateway with a
username and password combination. In this mode, the router acts as a VPN
Client of the remote gateway.
If you selected IPsec Host, enter the username and password for the host.

Configuring VPN Policies

To configure a VPN policy:
Choose VPN > IPsec > Advanced VPN Setup.
In the VPN Policy Table, click Add.
Enter a unique name to identify the policy.
Choose the Policy Type:
Configuring VPN Users, page
5
105.
98

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents