Cisco WAG54G User Manual - Page 71

How to Establish a Secure IPSec Tunnel, Step 1: Create an IPSec Policy, Step 2: Build Filter Lists

Page 71 highlights

Wireless-G ADSL Gateway How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run, and type secpol.msc in the Open field. The Local Security Setting screen will appear as shown in Figure C-1. 2. Right-click IP Security Policies on Local Computer (Win XP) or IP Security Policies on Local Machine (Win 2000), and click Create IP Security Policy. 3. Click the Next button, and then enter a name for your policy (for example, to_Router). Then, click Next. 4. Deselect the Activate the default response rule check box, and then click the Next button. 5. Click the Finish button, making sure the Edit check box is checked. Step 2: Build Filter Lists Filter List 1: win->Router 1. In the new policy's properties screen, verify that the Rules tab is selected, as shown in Figure C-2. Deselect the Use Add Wizard check box, and click the Add button to create a new rule. 2. Make sure the IP Filter List tab is selected, and click the Add button. (See Figure C-3.)The IP Filter List screen should appear, as shown in Figure C-4. Enter an appropriate name, such as win->Router, for the filter list, and de-select the Use Add Wizard check box. Then, click the Add button. Figure C-1: Local Security Screen NOTE: The references in this section to "win" are references to Windows 2000 and XP. Substitute the references to "Router" with "Gateway". Also, the text on your screen may differ from the text in your instructions for "OK or Close"; click the appropriate button on your screen. Figure C-2: Rules Tab Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway How to Establish a Secure IPSec Tunnel Figure C-3: IP Filter List Tab 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99

63
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway
How to Establish a Secure IPSec Tunnel
Step 1: Create an IPSec Policy
1.
Click the
Start
button, select
Run
, and type
secpol.msc
in the
Open
field.
The
Local Security Setting
screen
will appear as shown in Figure C-1.
2.
Right-click
IP Security Policies on Local Computer
(Win XP) or
IP Security Policies on Local Machine
(Win 2000), and click
Create IP Security Policy
.
3.
Click the
Next
button, and then enter a name for your policy (for example, to_Router). Then, click
Next
.
4.
Deselect the
Activate the default response rule
check box, and then click the
Next
button.
5.
Click the
Finish
button, making sure the
Edit
check box is checked.
Step 2: Build Filter Lists
Filter List 1: win->Router
1.
In the new policy’s properties screen, verify that the
Rules
tab is selected, as shown in Figure C-2. Deselect
the
Use Add Wizard
check box, and click the
Add
button to create a new rule.
2.
Make sure the
IP Filter List
tab is selected, and click the
Add
button. (See Figure C-3.)The
IP Filter List
screen should appear, as shown in Figure C-4. Enter an appropriate name, such as win->Router, for the filter
list, and de-select the
Use Add
Wizard
check box. Then, click the
Add
button.
NOTE:
The references in this section to “win” are
references to Windows 2000 and XP. Substitute
the references to “Router” with “Gateway”. Also,
the text on your screen may differ from the text in
your instructions for “OK or Close”; click the
appropriate button on your screen.
Figure C-1: Local Security Screen
Figure C-2: Rules Tab
Figure C-3: IP Filter List Tab