Step 4: Assign New Ipsec Policy; Step 5: Create A Tunnel Through The Web-Based Utility - Linksys RVS4000 User Manual

4-port gigabit security router with vpn business series
Hide thumbs Also See for RVS4000:
Table of Contents

Advertisement

Appendix C

Step 4: Assign New IPSec Policy

In the IP Security Policies on Local Machine window, right-
click the policy named to_Router, and click Assign. A
green arrow appears in the folder icon.
Local Computer
Step 5: Create a Tunnel Through the Web-Based
Utility
Open your web browser, and enter 9.8.. in the
1.
Address field. Press Enter.
2.
When the User name and Password fields appear, enter
the default user name and password, admin. Press
Enter.
Click the VPN tab, then click IPSec VPN.
3.
VPN > IPSec VPN
4.
Select the tunnel you wish to create in the Select
Tunnel Entry drop-down box. Then click Enable. Enter
4-Port Gigabit Security Router with VPN
Configuring IPSec with a Windows 2000 or XP Computer
5.
6.
7.
8.
9.
the name of the tunnel in the Tunnel Name field. This
is to allow you to identify multiple tunnels and does
not have to match the name used at the other end of
the tunnel.
Enter the IP Address and Subnet Mask of the local VPN
Router in the Local Group Setup fields. To allow access
to the entire IP subnet, enter 0 for the last set of IP
Addresses (e.g. 192.168.1.0).
Enter the IP Address and Subnet Mask of the VPN
device at the other end of the tunnel (the remote VPN
Router or device with which you wish to communicate)
in the Remote Group Setup fields.
Select from two types of authentication: MD and
SHA (SHA1 is recommended because it is more
secure). As with encryption, either of these may be
selected, provided that the VPN device at the other end
of the tunnel is using the same type of authentication.
Or, both ends of the tunnel may choose to Disable
authentication.
Select the Key Management. Select Auto (IKE) and
enter a series of numbers or letters in the Pre-shared
Key field. Select PFS (Perfect Forward Secrecy) to
ensure that the initial key exchange and IKE proposals
are secure. You may use any combination of up to 128
numbers or letters in this field. No special characters
or spaces are allowed. In the Key Lifetime field, you
may optionally select to have the key expire at the end
of a time period you designate. Enter the number of
seconds you'd like the key to be useful, or leave it blank
for the key to last indefinitely.
Click Save Settings to save these changes.
Your tunnel should now be established.
49

Advertisement

Table of Contents
loading

Table of Contents