Configuring VPN
Configuring Site-to-Site IPsec VPN Advanced Parameters
Cisco RV130/RV130W Wireless Multifunction VPN Router Administration Guide
103
6
-
Auto Policy
—Some parameters for the VPN tunnel are generated
automatically. This requires using the Internet Key Exchange (IKE)
protocol for negotiations between the two VPN endpoints.
-
Manual Policy
—All parameters (including the keys) for the VPN tunnel
are manually entered for each end point. No third-party server or
organization is involved.
c.
Remote Endpoint—
Select the type of identifier that you want to provide for
the gateway at the remote endpoint:
IP Address
or
FQDN
(Fully Qualified
Domain Name). Enter the IP address or the FQDN.
STEP
3
In the
Local Traffic Selection
and
Remote Traffic Selection
sections:
•
In
the Local IP and Remote IP
fields, indicate how many endpoints will be
part of the VPN policy:
-
Single
—Limits the policy to one host. Enter the IP address of the host that
will be part of the VPN in the
IP Address
field.
-
Subnet
—Allows an entire subnet to connect to the VPN. Enter the
network address in the
IP Address
field, and enter the subnet mask in the
Subnet Mask
field. Enter the subnet’s network IP address in the
IP
Address
field. Enter the subnet mask, such as 255.255.255.0, in the
Subnet Mask
field. The field automatically displays the default subnet
address based on the IP address.
Note: Do not use overlapping subnets for remote or local traffic selectors. Using
these subnets would require adding static routes on the router and the hosts to be
used. For example, avoid:
Local Traffic Selector: 192.168.1.0/24
Remote Traffic Selector: 192.168.0.0/16
STEP
4
For a Manual policy type, enter the settings in the
Manual Policy Parameters
section:
•
SPI-Incoming, SPI-Outgoing
—Enter a hexadecimal value between 3 and 8
characters; for example, 0x1234. Security Parameter Index (SPI) identifies
the Security Association of the incoming and outgoing traffic streams.
•
Manual Encryption Algorithm
—Select the algorithm used to encrypt the
data.
•
Key-In, Key-Out
—Enter the encryption key of the inbound and outbound
policy. The length of the key depends on the encryption algorithm chosen: