Configuration Of The Rv082; Configuration Of Pc 1 And Pc 2 - Cisco Linksys RVL200 User Manual

4-port ssl/ipsec vpn router business series
Hide thumbs Also See for Linksys RVL200:
Table of Contents

Advertisement

Appendx I
10.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings.
11.
In the Preshared Key field, enter a string for this key, for
example, 13572468.
RVL200 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settngs. Otherwise, click Save Settngs and proceed
to the next section, "Configuration of the RV082. "

Configuration of the RV082

Follow similar instructions for the RV082.
1.
Launch the web browser for a networked computer,
designated PC 2.
2.
Access the web-based utility of the RV082. (Refer to
the User Guide of the RV082 for details.)
3.
Click the IPSec VPN tab.
4.
Click the Gateway to Gateway tab.
5.
Enter a name in the Tunnel Name field.
6.
For the VPN Tunnel setting, select Enable.
7.
The WAN IP address (B.B.B.B) of the RV082 will be
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV082's local network settings in the IP Address and
Subnet Mask fields.
RV082 VPN Settings
4-Port SSL/IPSec VPN Router
Gateway-to-Gateway VPN Tunnel
For the Remote Security Gateway Type, select IP
8.
address. Enter the RVL200's WAN IP address in the IP
Address field.
9.
For the Remote Security Group Type, select Subnet.
Enter the RVL200's local network settings in the IP
Address and Subnet Mask fields.
10.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
11.
In the Preshared Key field, enter a string for this key, for
example, 13572468.
RV082 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settngs. Otherwise, click Save Settngs.

Configuration of PC 1 and PC 2

Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
8

Advertisement

Table of Contents
loading

Table of Contents