Download Print this page
Linksys RV082 How To Configure
Hide thumbs Also See for RV082:

Advertisement

Quick Links

Linksys Copy right reserved.
LINKSYS RV082 VPN ROUTER
Interoperability Profile
Overview
This document describes how to configure Linksys RV082 VPN Router to implement Scenario 1 that the
VPN Consortium specifies in "Documentation Profiles for IPSec Interoperability,"
http://www.vpnc.org/InteropProfiles/Interop-01.html
Scenario 1 is a gateway-to-gateway configuration with pre-shared secrets for authentication.
A Gateway-to-Gateway VPN Configuration
10.5.6.0/24
Gateway A
3
C o m
10.5.6.1
Gateway A (Linksys RV082) connects the internal LAN 10.5.6.0/24 to the Internet. Gateway A's LAN
interface IP address is 10.5.6.1, and its WAN interface IP address is 14.15.16.17
Gateway B (VPNC devices) connects the internal LAN 172.23.9.0/24 to the Internet. Gateway A's LAN
interface IP address is 172.23.9.1 and its WAN interface IP address is 22.23.24.25
2
The IKE Phase I parameters used in Scenario 1 are:
Main mode
Triple DES
SHA-1
MODP group 2 (1024 bits)
hr5xb84l6aa9r6"
Pre-shared secret of "
SA lifetime of 28800 seconds (8 hours) with no kbytes rekeying
The IKE Phase 2 parameters used in Scenario 1 are:
Triple DES
SHA-1
MODP group 2 (1024 bits)
Perfect forward secrecy (PFS Enable) for rekeying
SA lifetime of 3600 seconds (one hour) with no kbytes rekeying
Traffic for all IP protocols, all ports, between 10.5.6.0/24 and 172.23.9.0/24, using IPv4 subnets.
14.15.16.17
Figure 1 Gateway-to-Gateway VPN Configuration
172.23.9.0/24
Gateway B
3
C o m
22.23.24.25
172.23.9.1

Advertisement

loading
Need help?

Need help?

Do you have a question about the RV082 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Linksys RV082

  • Page 1 LINKSYS RV082 VPN ROUTER Interoperability Profile Overview This document describes how to configure Linksys RV082 VPN Router to implement Scenario 1 that the VPN Consortium specifies in “Documentation Profiles for IPSec Interoperability,” http://www.vpnc.org/InteropProfiles/Interop-01.html Scenario 1 is a gateway-to-gateway configuration with pre-shared secrets for authentication.
  • Page 2 Linksys Copy right reserved. Configuring RV082 VPN Router Default LAN private address is http://192.168.1.1. Please connect your PC to RV082 LAN port and use the browser to control the RV082. Setting up testing environment You must use the HTML-based User Interface for the first configuration step to set up the system time and date, and configuring the private Ethernet interface (to the internal LAN), as described in the following steps.
  • Page 3 Default gateway and DNS Server as needed (WAN IP Address=14.15.16.17; Subnet Mask=255.255.255.0; Default Gateway=22.23.24.25). In Firewall=>General, setup the firewall configuration as needed. Please Disable Block WAN Step 7 Request and Enable Fragmented Packet Pass Through to let go of the IPSec Packets in RV082 VPN Router.
  • Page 4 The VPN Summary displays the Summary, Tunnel Status and GroupVPN Status. Summary: It shows the amount of Tunnel(s) Used and Tunnel(s) Available. RV082 supports 1,000 tunnels. Detail: Click the Detail button to see the detail of VPN Summary as below, and user can save and export the file.
  • Page 5 Linksys Copy right reserved. Status: It shows Connected, Hostname Resolution Failed, Resolving Hostname or Waiting for Connection. If users select Manual in IPSec Setup page, the Status will show Manual and no Tunnel Test function for Manual Keying Mode. Phase2 Encrypt/Auth/Group: It shows the Encryption (DES/3DES), Authentication (MD5/SHA1) and Group (1/2/5) that you chose in IPSec Setup field.
  • Page 6 An IKE proposal contains values for Phase 1 IPSec negotiations. During Phase 1 the two peers establish a secure tunnel within which they then negotiate the Phase 2 parameters. The RV082 VPN Router uses IKE proposals both as initiator and responder in IPSec negotiations.
  • Page 7 Linksys Copy right reserved. are two Keying Modes of key management, Manual and IKE with Preshared Key (automatic). Encryption: There are two methods of encryption, DES and 3DES. The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption.
  • Page 8 Linksys Copy right reserved. network security is preferred, select Group 5. You can choose the different Group with the Phase 1 DH Group you chose. If Perfect Forward Secrecy is disabled, there is no need to setup the Phase 2 DH Group since no new key generated, and the key of Phase 2 will be same with the key in Phase 1.
  • Page 9 Linksys Copy right reserved. EXAMPLE: VPN IPSec Tunnel Configuration You can also reference the following example to setup IPSec tunnel with VPNC gateway. This setting is based on the portfolio shown on page 1.
  • Page 10 Linksys Copy right reserved.
  • Page 11 Linksys Copy right reserved.