Cisco WRV200 User Guide - Page 53

Step 4: Assign New IPSec Policy, Step 5: Create a Tunnel Through the Web-Based Utility, to_Router

Page 53 highlights

Appendix D Configuring IPSec with a Windows 2000 or XP Computer Step 4: Assign New IPSec Policy In the IP Security Policies on Local Machine window, rightclick the policy named to_Router, and click Assign. A green arrow appears in the folder icon. Local Computer Step 5: Create a Tunnel Through the Web-Based Utility 1. Open your web browser, and enter 192.168.1.1 in the Address field. Press Enter. 2. When the User name and Password fields appear, enter the default user name and password, admin. Press Enter. 3. Click the VPN tab, then click IPSec VPN. VPN > IPSec VPN 4. Select the tunnel you wish to create in the Select Tunnel Entry drop-down box. Then click Enabled next to the VPN Tunnel option. Enter the name of the tunnel in Wireless-G VPN Router with RangeBooster the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. Set the NATTraversal option to Disabled. 5. Enter the IP Address and Subnet Mask of the local VPN Router in the Local Secure Group fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0). 6. Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Secure Group fields. 7. Select the Key Management. a. Select Auto (IKE), then set the Operation Mode to Main. b. Select the ISAKMP encryption method: 3DES, AES128, AES-192, or AES-256. The method you select must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. c. Select the ISAKMP authentication method: MD5 or SHA1 (SHA1 is recommended as it is more secure). As with encryption, the method you select must be the same type of authentication used by the VPN device at the other end of the tunnel. d. Select the ISAKMP DH Group: 1024, 1536, 2048, 3072, 4096, 6144, or 8192. These represent different bits used in Diffie-Hellman mode operation. e. In the ISAKMP Key Lifetime field, enter a time period in seconds to have the key expire at the end of the designated period, or leave the field blank for the key to last indefinitely. f. Select PFS (Perfect Forward Secrecy) to ensure that the initial key exchange and IKE proposals are secure. g. For IPSec, specify the Encryption Method, Authentication Method, DH Group, and Key Lifetime in the same manner as for ISAKMP above. h. Enter a series of numbers or letters in the Preshared Key field. You may use any combination of up to 24 numbers or letters in this field. No special characters or spaces are allowed. 8. Click Save Settings to save these changes. Your tunnel should now be established. 48

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

´8
Configuring IPSec with a Windows 2000
or XP Computer
Wireless-G VPN Router with RangeBooster
Appendix D
Step 4: Assign New IPSec Policy
In the
IP Security Policies on Local Machine
window, right-
click the policy named
to_Router
, and click
Assign
. A
green arrow appears in the folder icon.
Local Computer
Step 5: Create a Tunnel Through the Web-Based
Utility
Open your web browser, and enter
±9².±¶8.±.±
in the
Address
field. Press
Enter
.
When the
User name
and
Password
fields appear, enter
the default user name and password,
admin
. Press
Enter
.
Click the
VPN
tab, then click
IPSec VPN
.
VPN > IPSec VPN
Select the tunnel you wish to create in the
Select Tunnel 
Entry
drop-down box. Then click
Enabled
next to the
VPN  Tunnel
option. Enter the name of the tunnel in
1.
2.
3.
4.
the
Tunnel Name
field.
This is to allow you to identify
multiple tunnels and does not have to match the
name used at the other end of the tunnel. Set the
NAT-
Traversal
option to
Disabled
.
Enter the IP Address and Subnet Mask of the local VPN
Router in the
Local Secure Group 
fields. To allow access
to the entire IP subnet, enter
0
for the last set of IP
Addresses (e.g. 192.168.1.0).
Enter the IP Address and Subnet Mask of the VPN
device at the other end of the tunnel (the remote VPN
Router or device with which you wish to communicate)
in the
Remote Secure Group 
fields.
Select the Key Management.
Select
Auto (IKE)
, then set the Operation Mode to
Main
.
Select the ISAKMP encryption method:
³DES
,
AES-
±²8
,
AES-±9²
, or
AES-²µ¶
. The method you select
must be the same type of encryption that is being
used by the VPN device at the other end of the
tunnel.
Select the ISAKMP authentication method:
MDµ
or
SHA±
(SHA1 is recommended as it is more secure).
As with encryption, the method you select must be
the same type of authentication used by the VPN
device at the other end of the tunnel.
Select the ISAKMP DH Group: 1024, 1536, 2048,
3072, 4096, 6144, or 8192. These represent different
bits used in Diffie-Hellman mode operation.
In the
ISAKMP Key Lifetime
field, enter a time period
in seconds to have the key expire at the end of the
designated period, or leave the field blank for the
key to last indefinitely.
Select
PFS
(Perfect Forward Secrecy) to ensure
that the initial key exchange and IKE proposals are
secure.
For
IPSec,
specify
the
Encryption
Method,
Authentication
Method,
DH
Group,
and
Key
Lifetime in the same manner as for ISAKMP above.
Enter a series of numbers or letters in the
Pre-
shared Key
field. You may use any combination of
up to 24 numbers or letters in this field. No special
characters or spaces are allowed.
Click
Save Settings
to save these changes.
Your tunnel should now be established.
5.
6.
7.
a.
b.
c.
d.
e.
f.
g.
h.
8.