Cisco WAG54G User Manual - Page 74

Step 3: Con Individual Tunnel Rules, Tunnel 1: win->Router

Page 74 highlights

Wireless-G ADSL Gateway Step 3: Configure Individual Tunnel Rules Tunnel 1: win->Router 1. From the IP Filter List tab, shown in Figure C-10, click the filter list win->Router. 2. Click the Filter Action tab (as in Figure C-11), and click the filter action Require Security radio button. Then, click the Edit button. 3. From the Security Methods tab, shown in Figure C-12, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. Select Session key Perfect Forward Secrecy, and click the OK button. Figure C-10: IP Filter List Tab Figure C-11: Filter Acton Tab Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway How to Establish a Secure IPSec Tunnel Figure C-12: Security Methods Tab 66

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99

66
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway
Step 3: Configure Individual Tunnel Rules
Tunnel 1: win->Router
1.
From the
IP Filter List
tab, shown in Figure C-10, click the filter list win->Router.
2.
Click the
Filter Action
tab (as in Figure C-11), and click the filter action
Require Security
radio button. Then,
click the
Edit
button.
3.
From the
Security Methods
tab, shown in Figure C-12, verify that the
Negotiate security
option is enabled,
and deselect the
Accept unsecured communication, but always respond using IPSec
check box. Select
Session key Perfect Forward Secrecy
, and click the
OK
button.
Figure C-12: Security Methods Tab
Figure C-10: IP Filter List Tab
Figure C-11: Filter Acton Tab