Cisco WAG54G User Manual - Page 77

C-19: IP Filter List Tab, C-20: Filter Action Tab

Page 77 highlights

Wireless-G ADSL Gateway 10. Go to the IP Filter List tab, and click the filter list Router->win, as shown in Figure C-19. 11. Click the Filter Action tab, and select the filter action Require Security, as shown in Figure C-20. Then, click the Edit button. From the Security Methods tab, shown previously in Figure C-12, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. Select Session key Perfect Forward Secrecy, and click the OK button. 12. Click the Authentication Methods tab, and verify that the authentication method Kerberos is selected, as shown in Figure C-21. Then, click the Edit button. Figure C-19: IP Filter List Tab Figure C-20: Filter Action Tab Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway How to Establish a Secure IPSec Tunnel Figure C-21: Authentication Methods Tab 69

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99

69
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway
10. Go to the
IP Filter List
tab, and click the filter list
Router->win
, as shown in Figure C-19.
11. Click the
Filter Action
tab, and select the filter action
Require Security
, as shown in Figure C-20. Then, click
the
Edit
button. From the
Security Methods
tab, shown previously in Figure C-12, verify that the
Negotiate
security
option is enabled, and deselect the
Accept unsecured communication, but always respond
using IPSec
check box. Select
Session key Perfect Forward Secrecy
, and click the
OK
button.
12. Click the
Authentication Methods
tab, and verify that the authentication method
Kerberos
is selected, as
shown in Figure C-21. Then, click the
Edit
button.
Figure C-19: IP Filter List Tab
Figure C-20: Filter Action Tab
Figure C-21: Authentication Methods Tab