Configuring Virtual Private Networks (VPNs) and Security
Configuring Security
Cisco RV120W Administration Guide
107
5
To configure VPN passthrough:
STEP 1
Choose VPN > IPsec > VPN Passthrough.
STEP
2
Choose the type of traffic to allow to pass through the router:
•
IPsec—Check Enable to allow IP security tunnels to pass through the router.
•
PPTP—Check Enable to allow Point-to-Point Tunneling Protocol tunnels to
pass through the router.
•
L2TP—Check Enable to allow Layer 2 Tunneling Protocol tunnels to pass
through the router.
STEP
3
Click Save.
Configuring Security
The Cisco RV120W provides several security methods, including certificate
authentication, RADIUS server support, and 802.1x port-based authentication.
Using Certificates for Authentication
The Cisco RV120W uses digital certificates for IPsec VPN authentication and SSL
validation (for HTTPS and SSL VPN authentication). You can obtain a digital
certificate from a well-known Certificate Authority (CA) such as VeriSign, or
generate and sign your own certificate using functionality available on this
gateway. The gateway comes with a self-signed certificate, and this can be
replaced by one signed by a CA as per your networking requirements.
A CA
certificate provides strong assurance of the server's identity and is a requirement
for most corporate network VPN solutions.
A self certificate is a certificate issued by a CA identifying your device (or self-
signed if you don't want the identity protection of a CA). To request a self
certificate to be signed by a CA, you can generate a Certificate Signing Request
from the gateway by entering identification parameters and sending to the CA for
signing.
Once signed, the CA's Trusted Certificate and signed certificate from the
CA are uploaded to activate the self-certificate validating the identity of this
gateway. The self certificate is then used in IPsec and SSL connections with peers
to validate the gateway's authenticity.