Linksys WAG54G User Guide - Page 73

Step 3: Con Individual Tunnel Rules, Tunnel 1: win->Gateway

Page 73 highlights

Wireless-G ADSL Gateway Step 3: Configure Individual Tunnel Rules Tunnel 1: win->Gateway 1. From the IP Filter List tab, shown in Figure C-10, click the filter list win->Gateway. 2. Click the Filter Action tab (as in Figure C-11), and click the filter action Require Security radio button. Then, click the Edit button. 3. From the Security Methods tab, shown in Figure C-12, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box. Select Session key Perfect Forward Secrecy, and click the OK button. Figure C-10: IP Filter List Tab Figure C-11: Filter Action Tab Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway How to Establish a Secure IPSec Tunnel Figure C-12: Security Methods Tab 66

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

66
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway
Step 3: Configure Individual Tunnel Rules
Tunnel 1: win->Gateway
1.
From the IP Filter List tab, shown in Figure C-10, click the filter list win->Gateway.
2.
Click the
Filter Action
tab (as in Figure C-11), and click the filter action Require Security radio button. Then,
click the Edit button.
3.
From the Security Methods tab, shown in Figure C-12, verify that the Negotiate security option is enabled, and
deselect the
Accept unsecured communication
, but always respond using IPSec check box. Select
Session key Perfect Forward Secrecy
, and click the
OK
button.
Figure C-12: Security Methods Tab
Figure C-11: Filter Action Tab
Figure C-10: IP Filter List Tab