Page 46 / 63 Scroll up to view Page 41 - 45
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
85
Instant Broadband
®
Series
84
3.
From
the
Security
Methods
tab, shown in
Figure C-12, verify that
the
Negotiate security
option is enabled, and
deselect
the
Accept
unsecured communica-
tion,
but
always
respond using IPSec
check
box.
Select
Session
key
Perfect
Forward Secrecy
, and
click the
OK
button.
4.
Select the
Authentication
Methods
tab, shown in
Figure C-13, and click the
Edit
button.
Figure C-12
Figure C-13
5.
Change the authentica-
tion method to
Use this
string to protect the
key exchange (pre-
shared key)
, as shown
in Figure C-14, and
enter the preshared key
string,
such
as
XYZ12345
. Click the
OK
button.
6.
This new Preshared
key will be displayed in
Figure C-15. Click the
OK
or
Close
button to
continue.
Figure C-14
Figure C-15
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
87
Instant Broadband
®
Series
86
7.
Select
the
Tunnel
Setting
tab, shown in
Figure C-16, and click
The tunnel endpoint is
specified by this IP
Address
radio button.
Then, enter the Router’s
WAN IP Address
.
8.
Select the
Connection
Type
tab, as shown in
Figure C-17, and click
All network connec-
tions
. Then, click the
OK
or
Close
button to finish
this rule.
Figure C-16
Figure C-17
Tunnel 2: router->win
9.
In the new policy’s
properties
screen,
shown in Figure C-18,
make sure that “win ->
router” is select and
deselect the
Use Add
Wizard
check
box.
Then, click the
Add
button to create the
second IP filter.
10. Go to the
IP Filter List
tab, and click the filter
list
router->win
,
as
shown in Figure C-19
Figure C-18
Figure C-19
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
89
Instant Broadband
®
Series
88
11. Click the
Filter Action
tab, and select the filter
action
Require Security
,
as shown in Figure C-20.
Then, click the
Edit
but-
ton.
12. Click the
Authentication
Methods
tab, and verify
that the authentication
method
Kerberos
is
selected, as shown in
Figure C-21. Then, click
the
Edit
button.
Figure C-20
Figure C-21
13. Change the authenti-
cation method to
Use
this string to protect
the key exchange
(preshared key)
, and
enter the preshared
key string, such as
XYZ12345
,
as
shown in Figure C-
22. (This is a sample
key
string.
Yours
should be a key that
is unique but easy to
remember.)
Then
click the
OK
button.
14. This new Preshared
key will be displayed
in Figure C-23. Click
the
OK
button to
continue.
Figure C-22
Figure C-23
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
91
Instant Broadband
®
Series
90
15. From
the
Tunnel
Setting tab, shown in
Figure C-24, click the
radio button for
The
tunnel endpoint is
specified by this IP
Address
, and enter
the
Windows
2000/XP computer’s
IP Address.
16. Click the
Connection
Type
tab, shown in
Figure
C-25,
and
select
All network
connections
.
Then
click the
OK
(for
Windows
XP)
or
Close
(for Windows
2000) button to finish.
Figure C-24
Figure C-25
17. From the Rules tab,
shown in Figure C-
26, click the
OK
button to return to
the secpol screen.
In the
IP Security Policies on Local Computer
window, shown in Figure C-
27, right-click the policy named
to_router
, and click
Assign
. A green arrow
appears in the folder icon.
Figure C-26
Figure C-27
Step Four: Assign New IPSec Policy
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
93
Instant Broadband
®
Series
92
1.
Open your web browser, and enter
192.168.1.1
in the Address field. Press
the
Enter
key.
2.
When the User name and Password field appears, skip the user name and
enter the default password
admin
. Press the
Enter
key.
3.
From the Setup tab, shown in Figure C-28, click the
VPN
tab.
4.
From the VPN tab, shown in Figure C-29, select
Enable
beside This Table.
5.
Enter a
Tunnel Name
. This name should be unique for this particular tun-
nel.
6.
Select
Subnet
from the pull-down menu beside Local Secure Group. Then,
enter the
IP Address
for this group. This would be the IP Address of the
local endpoint, your endpoint.
7.
Select
IP Addr.
from the pull-down menu beside Remote Secure Group.
Then, enter the
IP Address
for this group. This would be the IP Address of
the remote endpoint, the endpoint on the other side of the tunnel.
Figure C-28
Step Five: Create a Tunnel Through the Web-Based Utility
Note:
Further details on this step can be found in the VPN Tab section
in “Chapter 6: The Cable/DSL VPN Router’s Web-Based Utility”.
8.
Select
IP Addr.
from the pull-down menu beside Remote Security
Gateway. This would be the IP Address of your Internet connection as seen
from the Internet. Enter this
IP Address
here.
9.
Select a type of
encryption
and
authentication
for the tunnel your are
establishing.
10. Check
PFS (Perfect Forward Secrecy)
and enter the
Pre-Shared Key
and
Key Lifetime
.
11. Click the
Apply
button followed by the
Continue
button.
12. Click the
Connect
button.
Your tunnel should now be established.
Figure C-29
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top