Cisco WRV200 User Guide - Page 50

Step 3: Con Individual Tunnel Rules, Tunnel 1: win->Router

Page 50 highlights

Appendix D Configuring IPSec with a Windows 2000 or XP Computer 2. Click the Filter Action tab, and click the filter action Require Security radio button. Then, click Edit. Filters Properties 10. If you want to enter a description for your filter, click the Description tab and enter the description there. 11. Click OK or Close and the New Rule Properties screen appears with the IP Filter List tab selected. The screen will contain listings for Router->win and win->Router. Click OK (Windows XP) or Close (Windows 2000) in the IP Filter List window. Filter Action Tab 3. On the Security Methods tab, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. Select Session key Perfect Forward Secrecy, and click OK. New Rule Properties Step 3: Configure Individual Tunnel Rules Tunnel 1: win->Router 1. On the IP Filter List tab, select filter list win->Router. Security Methods Tab 4. Select the Authentication Methods tab, and click Edit. IP Filter List Tab Wireless-G VPN Router with RangeBooster Authentication Methods Tab 5. Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345. Click OK. 45

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

´µ
Configuring IPSec with a Windows 2000
or XP Computer
Wireless-G VPN Router with RangeBooster
Appendix D
Filters Properties
If you want to enter a description for your filter, click
the
Description
tab and enter the description there.
Click
OK
or
Close
and the
New Rule Properties
screen
appears with the
IP Filter List
tab selected. The screen
will contain listings for
Router->win
and
win->Router
.
Click
OK
(Windows XP) or
Close
(Windows 2000) in the
IP Filter List
window.
New Rule Properties
Step 3: Configure Individual Tunnel Rules
Tunnel 1: win->Router
On the
IP Filter List
tab, select filter list
win->Router
.
IP Filter List Tab
10.
11.
1.
Click the
Filter  Action
tab, and click the filter action
Require Security
radio button. Then, click
Edit
.
Filter Action Tab
On the
Security Methods
tab, verify that the
Negotiate
security
option is enabled, and deselect the
Accept
unsecured communication, but always respond
using IPSec
check box. Select
Session key Perfect
Forward Secrecy
, and click
OK
.
Security Methods Tab
Select the
Authentication Methods
tab, and click
Edit
.
Authentication Methods Tab
Change the authentication method to
Use this string to
protect the key exchange (preshared key)
, and enter
the preshared key string, such as XYZ12345. Click
OK
.
2.
3.
4.
5.