Configuration Of The Rv082; Configuration Of Pc 1 And Pc 2 - Linksys RVS4000 User Manual

4-port gigabit security router with vpn business series
Hide thumbs Also See for RVS4000:
Table of Contents

Advertisement

Appendix D
10.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings.
11.
In the Preshared Key field, enter a string for this key, for
example, 13572468.
RVS4000 IPSec Setup Settings
12.
If you need more detailed settings, click Advanced
Settings. Otherwise, click Save Settings and proceed
to the next section, "Configuration of the RV082. "

Configuration of the RV082

Follow similar instructions for the RV082.
1.
Launch the web browser for a networked computer,
designated PC 2.
2.
Access the web-based utility of the RV082. (Refer to
the User Guide of the RV082 for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
5.
Enter a name in the Tunnel Name field.
For the VPN Tunnel setting, select Enable.
6.
7.
The WAN IP address (B.B.B.B) of the RV082 will be
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV082's local network settings in the IP Address and
Subnet Mask fields.
RV082 VPN Settings
4-Port Gigabit Security Router with VPN
Gateway-to-Gateway VPN Tunnel
For the Remote Security Gateway Type, select IP
8.
address. Enter the RVS4000's WAN IP address in the IP
Address field.
9.
For the Remote Security Group Type, select Subnet.
Enter the RVS4000's local network settings in the IP
Address and Subnet Mask fields.
10.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
RVS4000.)
11.
In the Preshared Key field, enter a string for this key, for
example, 13572468.
RV082 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.

Configuration of PC 1 and PC 2

Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.


Advertisement

Table of Contents
loading

Table of Contents