Page 111 / 128 Scroll up to view Page 106 - 110
102
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway with 2 Phone Ports
13. Change the authentication method to
Use this string to protect the key exchange
(preshared key)
, and
enter the preshared key string, such as XYZ12345, as shown in the example. (This is a sample key string.
Yours should be a key that is unique but easy to remember.) Then click the
OK
button.
14. This new Preshared key will be displayed. Click the
Apply
button to continue, if it appears on your screen,
otherwise proceed to the next step.
15. Click the
Tunnel Setting
tab, click the radio button for
The tunnel endpoint is specified by this IP Address,
and enter the Windows 2000/XP computer’s IP Address.
Figure C-22: Preshared Key
Figure C-23: New Preshared Key
Figure C-24: Tunnel Setting Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 112 / 128
103
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway with 2 Phone Ports
16. Click the
Connection Type
tab, and select
All network connections
. Then click the
OK
or
Close
button to
finish.
17. From the
Rules
tab, click the
OK
or
Close
button to return to the secpol screen.
Step 4: Assign New IPSec Policy
In the IP Security Policies on
Local Computer
window, right-click the policy named
to_Router
, and click
Assign
. A
green arrow appears in the folder icon.
Figure C-25: Connection Type
Figure C-26: Rules
Figure C-27: Local Computer
Downloaded from
www.Manualslib.com
manuals search engine
Page 113 / 128
104
Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
How to Establish a Secure IPSec Tunnel
Wireless-G ADSL Gateway with 2 Phone Ports
Step 5: Create a Tunnel Through the Web-Based Utility
1.
Open your web browser, and enter
192.168.1.1
in the Address field. Press the
Ente
r key.
2.
When the User name and Password field appears, enter the default user name and password
admin
. Press
the
Enter
key.
3.
From the
Setup
tab, click the
VPN
tab.
4.
From the
VPN
tab, select the tunnel you wish to create in the
Select Tunnel Entry
drop-down box. Then click
Enabled
. Enter the name of the tunnel in the
Tunnel Name
field.
This is to allow you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel.
5.
Enter the IP Address and Subnet Mask of the local VPN Router in the
Local Secure Group
fields. To allow
access to the entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0).
6.
Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router
or device with which you wish to communicate) in the
Remote Security Router
fields.
7.
Select fromtwo different types of encryption:
DES
or
3DES
(3DES is recommended because it is more secure).
You may choose either of these, but it must be the same type of encryption that is being used by the VPN
device at the other end of the tunnel.
Or, you may choose not to encrypt by selecting Disable.
8.
Select from two types of authentication:
MD5
and
SHA
(SHA is recommended because it is more secure).
As
with encryption, either of these may be selected, provided that the VPN device at the other end of the tunnel
is using the same type of authentication.
Or, both ends of the tunnel may choose to
Disable
authentication.
9.
Select the Key Management. Select
Auto (IKE)
and enter a series of numbers or letters in the
Pre-shared Key
field. Check the box next to
PFS
(Perfect Forward Secrecy) to ensure that the initial key exchange and IKE
proposals are secure. You may use any combination of up to 24 numbers or letters in this field. No special
characters or spaces are allowed. In the
Key Lifetime
field, you may optionally select to have the key expire at
the end of a time period of your choosing.
Enter the number of seconds you’d like the key to be useful, or
leave it blank for the key to last indefinitely.
10. Click the
Save Settings
button to save these changes.
Your tunnel should now be established.
Figure C-28: VPN Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 114 / 128
105
Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
Windows 98 or Me Instructions
Wireless-G ADSL Gateway with 2 Phone Ports
Appendix D: Finding the MAC Address and IP Address for Your
Ethernet Adapter
This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC
filtering feature of the Gateway. You can also find the IP address of your computer’s Ethernet adapter. This IP
address is used for the Gateway’s filtering, forwarding, and/or DMZ features. Follow the steps in this appendix to
find the adapter’s MAC or IP address in Windows 98, Me, 2000, or XP.
Windows 98 or Me Instructions
1.
Click
Start
and
Run
. In the
Open
field, enter
winipcfg
. Then press the
Enter
key or the
OK
button.
2.
When the
IP Configuration
screen appears, select the Ethernet adapter you have connected to the Gateway
via a CAT 5 Ethernet network cable.
3.
Write down the Adapter Address as shown on your computer screen. This is the MAC address for your
Ethernet adapter and is shown in hexadecimal as a series of numbers and letters.
The MAC address/Adapter Address is what you will use for MAC filtering. The example shown displays the
Ethernet adapters’s MAC address as 00-00-00-00-00-00. Your computer will show something different.
The example shown displays the Ethernet adapter’s IP address as 192.168.1.100. Your computer may show
something different.
Figure D-2: MAC Address/Adapter
Address
Figure D-1: IP Configuration Screen
Note:
The MAC address is also called the Adapter Address.
Downloaded from
www.Manualslib.com
manuals search engine
Page 115 / 128
106
Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
Windows 2000 or XP Instructions
Wireless-G ADSL Gateway with 2 Phone Ports
Windows 2000 or XP Instructions
1.
Click
Start
and
Run
. In the
Open
field, enter
cmd
. Press the
Enter
key or click the
OK
button.
2.
At the command prompt, enter
ipconfig /all
. Then press the
Enter
key.
3.
Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet
adapter. This appears as a series of numbers and letters.
The MAC address/Physical Address is what you will use for MAC filtering. The exampleshown displays the
Ethernet adapters’s MAC address as 00-00-00-00-00-00. Your computer will show something different.
The example shown displays the Ethernet adapter’s IP address as 192.168.1.100. Your computer may show
something different.
Figure D-3: MAC Address/Physical Address
Note:
The MAC address is also called the Physical Address.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top