Figure 6-38: Local Secure Group - Ip Address And Remote Secure Group - Ip Address; Figure 6-39: Local Secure Group - Host And Remote Secure Group - Ip Addr; Figure 6-40: Local Secure Group - Ip Addr. And Remote Secure Group - Any - Linksys WRV200 User Manual

2.4ghz 802.11g wireless-g vpn router with rangebooster
Table of Contents

Advertisement

Wireless-G VPN Router with RangeBooster
Remote Secure Group
The Remote Secure Group is the computer(s) on the remote end of the tunnel that can access the tunnel. From
the drop-down menu, select Subnet, to include the entire network for the tunnel; select IP address if you want a
specific computer; IP Range, if you want to include a range of IP addresses; select Host, if the VPN will terminate
at the Router, instead of the PC; or Any, to allow any computer to access the tunnel. The screen will change
depending on the selected option. The options are described below.
Subnet. Enter the IP Address and Mask of the remote VPN router in the fields provided. To allow access to the
entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0).
IP Addr. Enter the IP Address of the remote VPN router. The Mask will be displayed.
Host. The VPN tunnel will terminate at the router with this setting. Use Port Range Forwarding to direct traffic to
the correct computer. Refer to the Port Range Forwarding tab of the Firewall tab.
Any. Allows any computer to access the tunnel.
Remote Secure Gateway
The Remote Secure Gateway is the VPN device, such as a second VPN router, on the remote end of the VPN
tunnel. Enter the IP Address of the VPN device at the other end of the tunnel. The remote VPN device can be
another VPN router, a VPN server, or a computer with VPN client software that supports IPSec. The IP address may
either be static (permanent) or dynamic, depending on the settings of the remote VPN device.
If the IP Address is static, select IP Addr. and enter the IP address. Make sure that you have entered the IP
address correctly, or the connection cannot be made. Remember, this is NOT the IP address of the local VPN
Router; it is the IP address of the remote VPN router or device with which you wish to communicate. If the IP
address is dynamic, select FQDN for DDNS or Any. If FQDN is selected, enter the domain name of the remote
router, so the Router can locate a current IP address using DDNS. If Any is selected, then the Router will accept
requests from any IP address.
Key Management
Key Exchange Method. IKE is an Internet Key Exchange protocol used to negotiate key material for Security
Association (SA). IKE uses the Pre-shared Key to authenticate the remote IDE peer. Select Auto (IKE) for the Key
Exchange Method. Both ends of a VPN tunnel must use the same mode of key management. The settings
available on this screen may change, depending on the selection you have made.
Encryption. Using encryption also helps make your connection more secure. There are two different types of
encryption: DES or 3DES (3DES is recommended because it is more secure). You may choose either of these, but
Chapter 6: Configuring the Wireless-G VPN Router
The VPN Tab - IPSec VPN
Figure 6-38: Local Secure Group - IP Address
and Remote Secure Group - IP Address
Figure 6-39: Local Secure Group - Host
and Remote Secure Group - IP Addr.
Figure 6-40: Local Secure Group - IP Addr.
and Remote Secure Group - Any
42

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents