Cisco WUSB54G User Guide - Page 119

Step 5: Create a Tunnel Through the Web-Based Utility

Page 119 highlights

Wireless-G VPN Broadband Router Step 5: Create a Tunnel Through the Web-Based Utility 1. Open your web browser, and enter 192.168.1.1 in the Address field. Press the Enter key. 2. When the User name and Password fields appear, enter the default user name and password, admin. Press the Enter key. 3. From the Setup tab, click the VPN tab. 4. From the VPN tab, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. Then click Enabled. Enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. 5. Enter the IP Address and Subnet Mask of the local VPN Router in the Local Secure Group fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0). 6. Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Security Router fields. 7. Select from two different types of encryption: DES or 3DES (3DES is recommended because it is more secure). You may choose either of these, but it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. Or, you may choose not to encrypt by selecting Disable. 8. Select from two types of authentication: MD5 and SHA (SHA is recommended because it is more secure). As with encryption, either of these may be selected, provided that the VPN device at the other end of the tunnel is using the same type of authentication. Or, both ends of the tunnel may choose to Disable authentication. 9. Select the Key Management. Select Auto (IKE) and enter a series of numbers or letters in the Pre-shared Key field. Check the box next to PFS (Perfect Forward Secrecy) to ensure that the initial key exchange and IKE proposals are secure. You may use any combination of up to 24 numbers or letters in this field. No special characters or spaces are allowed. In the Key Lifetime field, you may optionally select to have the key expire at the end of a time period you designate. Enter the number of seconds you'd like the key to be useful, or leave it blank for the key to last indefinitely. 10. Click the Save Settings button to save these changes. Your tunnel should now be established. Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel Figure D-28: VPN Tab 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145

109
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
Step 5: Create a Tunnel Through the Web-Based Utility
1.
Open your web browser, and enter
192.168.1.1
in the
Address
field. Press the
Ente
r key.
2.
When the
User name
and
Password
fields appear, enter the default user name and password,
admin
. Press
the
Enter
key.
3.
From the
Setup
tab, click the
VPN
tab.
4.
From the
VPN
tab, select the tunnel you wish to create in the
Select Tunnel Entry
drop-down box. Then click
Enabled
. Enter the name of the tunnel in the
Tunnel Name
field.
This is to allow you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel.
5.
Enter the IP Address and Subnet Mask of the local VPN Router in the
Local Secure Group
fields. To allow
access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0).
6.
Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router
or device with which you wish to communicate) in the
Remote Security Router
fields.
7.
Select from two different types of encryption:
DES
or
3DES
(3DES is recommended because it is more
secure).
You may choose either of these, but it must be the same type of encryption that is being used by the
VPN device at the other end of the tunnel.
Or, you may choose not to encrypt by selecting Disable.
8.
Select from two types of authentication:
MD5
and
SHA
(SHA is recommended because it is more secure).
As
with encryption, either of these may be selected, provided that the VPN device at the other end of the tunnel
is using the same type of authentication.
Or, both ends of the tunnel may choose to
Disable
authentication.
9.
Select the Key Management. Select
Auto (IKE)
and enter a series of numbers or letters in the
Pre-shared Key
field. Check the box next to
PFS
(Perfect Forward Secrecy) to ensure that the initial key exchange and IKE
proposals are secure. You may use any combination of up to 24 numbers or letters in this field. No special
characters or spaces are allowed. In the
Key Lifetime
field, you may optionally select to have the key expire at
the end of a time period you designate.
Enter the number of seconds you’d like the key to be useful, or leave
it blank for the key to last indefinitely.
10. Click the
Save Settings
button to save these changes.
Your tunnel should now be established.
Figure D-28: VPN Tab