Cisco WRV200 User Guide - Page 52

Authentication Methods, Connection Type

Page 52 highlights

Appendix D Configuring IPSec with a Windows 2000 or XP Computer Filter Action Tab 12. Click the Authentication Methods tab, and verify that the authentication method Kerberos is selected. Then, click Edit. New Preshared Key 15. Click the Tunnel Setting tab. Click the radio button The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer's IP Address. Authentication Methods Tab 13. Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345. (This is a sample key string. Yours should be a key that is unique but easy to remember.) Then click OK. Tunnel Setting Tab 16. Click the Connection Type tab, and select All network connections. Then click OK or Close to finish. Preshared Key 14. This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step. Wireless-G VPN Router with RangeBooster Connection Type Tab 17. On the Rules tab, click the OK or Close button to return to the screen showing the security policies. Rules Tab 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

´·
Configuring IPSec with a Windows 2000
or XP Computer
Wireless-G VPN Router with RangeBooster
Appendix D
Filter Action Tab
Click the
Authentication Methods
tab, and verify
that the authentication method
Kerberos
is selected.
Then, click
Edit
.
Authentication Methods Tab
Change the authentication method to
Use this string
to protect the key exchange (preshared key)
, and
enter the preshared key string, such as XYZ12345.
(This is a sample key string. Yours should be a key that
is unique but easy to remember.) Then click
OK
.
Preshared Key
This new Preshared key will be displayed. Click the
Apply
button to continue, if it appears on your screen;
otherwise, proceed to the next step.
12.
13.
14.
New Preshared Key
Click the
Tunnel Setting
tab. Click the radio button
The
tunnel endpoint is specified by this IP Address
, and
enter the Windows 2000/XP computer’s IP Address.
Tunnel Setting Tab
Click the
Connection Type
tab, and select
All network
connections
. Then click
OK
or
Close
to finish.
Connection Type Tab
On the
Rules
tab, click the
OK
or
Close
button to
return to the screen showing the security policies.
Rules Tab
15.
16.
17.