Page 56 / 72 Scroll up to view Page 51 - 55
µ±
Gateway-to-Gateway VPN Tunnel
Wireless-G VPN Router with RangeBooster
Appendix E
Configuration when the Remote Gateway
Uses a Dynamic IP Address
This example assumes the Remote Gateway is using a
dynamic IP address. If the Remote Gateway uses a static
IP address, refer to “Configuration when the Remote
Gateway Uses a Static IP.”
WAN: A.A.A.A
LAN: 192.168.5.1
Dynamic IP: B.B.B.B with
Domain Name: www.abc.com
WRV200
RV082
Gateway-to-Gateway IPSec VPN Tunnel - Remote Gateway Using
Dynamic IP
NOTE:
Each computer must have a network
adapter installed.
Configuration of the WRV200
Follow these instructions for the first VPN Router,
designated WRV200. The other VPN Router is designated
the RV082.
Launch the web browser for a networked computer,
designated PC 1.
Access the web-based utility of the WRV200. (Refer
to “Chapter 5: Configuring the Wireless-G Router” for
details.)
Click the
VPN
tab.
Click
IPSec VPN
.
For the IPSec VPN Tunnel setting, select
Enable
.
Enter a name in the
Tunnel Name
field.
For the Local Secure Group Type, select
Subnet
. Enter
the WRV200’s local network settings in the
IP Address 
and
Mask 
fields.
1.
2.
3.
4.
5.
6.
7.
WRV200 IPSec VPN Settings
For the Remote Secure Group Type, select
Subnet
.
Enter the RV082’s local network settings in the
IP 
Address
and
Subnet Mask f
ields.
For the Remote Secure Gateway Type, select
FQDN
.
Enter the RV082’s domain name in the field provided.
In the Key Management section, select the appropriate
encryption, authentication, and other key management
settings.
In the
Preshared Key
field, enter a string for this key, for
example,
test±²³´
.
WRV200 Key Management Settings
Click
Save Settings
and proceed to the next section,
“Configuration of the RV082.”
Configuration of the RV082
Follow similar instructions for the RV082.
Launch the web browser for a networked computer,
designated PC 2.
Access the Web-based Utility of the RV082. (Refer to
the User Guide of the RV082 for details.)
Click the
IPSec VPN
tab.
Click the
Gateway to Gateway
tab.
Enter a name in the
Tunnel Name
field.
For the VPN Tunnel setting, select
Enable
.
The WAN IP address (B.B.B.B) of the RV082 will be
automatically detected.
8.
9.
10.
11.
12.
1.
2.
3.
4.
5.
6.
7.
Page 57 / 72
µ²
Gateway-to-Gateway VPN Tunnel
Wireless-G VPN Router with RangeBooster
Appendix E
For the Local Security Group Type, select
Subnet
. Enter
the RV082’s local network settings in the
IP Address 
and
Subnet Mask
fields.
RV082 VPN Settings
For the Remote Security Gateway Type, select
IP
address
. Enter the WRV200’s WAN IP address in the
IP 
Address
field.
For the Remote Security Group Type, select
Subnet
.
Enter the WRV200’s local network settings in the
IP 
Address
and
Subnet Mask
fields.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
WRV200.)
In the
Preshared Key
field, enter a string for this key, for
example,
test±²³´
.
RV082 IPSec Setup Settings
Click
Save Settings
.
Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
Configuration when Both Gateways Use
Dynamic IP Addresses
This example assumes both Gateways are using dynamic
IP addresses. If only the Remote Gateway uses a dynamic
8.
9.
10.
11.
12.
IP address, refer to “Configuration when the Remote
Gateway Uses a Dynamic IP.”
Dynamic IP: A.A.A.A
with Domain Name:
www.xyz.com
LAN: 192.168.5.1
Dynamic IP: B.B.B.B with
Domain Name: www.abc.com
WRV200
RV082
Gateway-to-Gateway IPSec VPN Tunnel - Both Gateways Using
Dynamic IP
NOTE:
Each computer must have a network
adapter installed.
Configuration of the WRV200
Follow these instructions for the first VPN Router,
designated WRV200. The other VPN Router is designated
the RV082.
Launch the web browser for a networked computer,
designated PC 1.
Access the web-based utility of the WRV200. (Refer
to “Chapter 5: Configuring the Wireless-G Router” for
details.)
Click the
VPN
tab.
Click
IPSec VPN
.
For the IPSec VPN Tunnel setting, select
Enable
.
Enter a name in the
Tunnel Name
field.
For the Local Secure Group Type, select
Subnet
. Enter
the WRV200’s local network settings in the
IP Address 
and
Mask 
fields.
WRV200 IPSec VPN Settings
1.
2.
3.
4.
5.
6.
7.
Page 58 / 72
µ³
Gateway-to-Gateway VPN Tunnel
Wireless-G VPN Router with RangeBooster
Appendix E
For the Remote Secure Group Type, select
Subnet
.
Enter the RV082’s local network settings in the
IP 
Address
and
Mask f
ields.
For the Remote Secure Gateway Type, select
FQDN
.
Enter the RV082’s domain name in the field provided.
In the Key Management section, select the appropriate
encryption, authentication, and other key management
settings.
In the
Preshared Key
field, enter a string for this key, for
example,
test±²³´
.
WRV200 Key Management Settings
Click
Save Settings
and proceed to the next section,
“Configuration of the RV082.”
Configuration of the RV082
Follow similar instructions for the RV082.
Launch the web browser for a networked computer,
designated PC 2.
Access the Web-based Utility of the RV082. (Refer to
the User Guide of the RV082 for details.)
Click the
IPSec VPN
tab.
Click the
Gateway to Gateway
tab.
Enter a name in the
Tunnel Name
field.
For the VPN Tunnel setting, select
Enable
.
The WAN IP address (B.B.B.B) of the RV082 will be
automatically detected.
For the Local Security Group Type, select
Subnet
. Enter
the RV082’s local network settings in the
IP Address 
and
Subnet Mask
fields.
8.
9.
10.
11.
12.
1.
2.
3.
4.
5.
6.
7.
RV082 VPN Settings
For the Remote Security Gateway Type, select
IP by
DNS Resolved
. Enter the WRV200’s domain name in
the field provided.
For the Remote Security Group Type, select
Subnet
.
Enter the WRV200’s local network settings in the
IP 
Address
and
Subnet Mask
fields.
In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
WRV200.)
In the
Preshared Key
field, enter a string for this key, for
example,
test±²³´
.
RV082 IPSec Setup Settings
Click
Save Settings
.
Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
8.
9.
10.
11.
12.
Page 59 / 72
µ´
Glossary
Wireless-G VPN Router with RangeBooster
Appendix F
Appendix F:
Glossary
This glossary contains some basic networking terms you
may come across when using this product.
WEB:
For additional terms, please visit the
glossary at
www.linksys.com/glossary
Access Point
A device that allows wireless-equipped
computers and other devices to communicate with a
wired network. Also used to expand the range of a wireless
network.
Ad-hoc
A group of wireless devices communicating
directly with each other (peer-to-peer) without the use of
an access point.
AES (Advanced Encryption Standard)
A security method
that uses symmetric 128-bit block data encryption.
Bandwidth
The transmission capacity of a given device
or network.
Bit
A binary digit.
Boot
To start a device and cause it to start executing
instructions.
Broadband
An always-on, fast Internet connection.
Browser
An application program that provides a way to
look at and interact with all the information on the World
Wide Web.
Byte
A unit of data that is usually eight bits long
Cable Modem
A device that connects a computer to the
cable television network, which in turn connects to the
Internet.
Daisy Chain
A method used to connect devices in a
series, one after the other.
DDNS (Dynamic Domain Name System)
Allows the
hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP
address.
Default Gateway
A device that forwards Internet traffic
from your local area network.
DHCP
(Dynamic
Host
Configuration
Protocol)
A
networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing”
an IP address to a user for a limited amount of time, instead
of assigning permanent IP addresses.
DMZ (Demilitarized Zone)
Removes the Router’s firewall
protection from one PC, allowing it to be “seen” from the
Internet.
DNS (Domain Name Server)
The IP address of your ISP’s
server, which translates the names of websites into IP
addresses.
Domain
A specific name for a network of computers.
Download
To receive a file transmitted over a network.
DSL (Digital Subscriber Line)
An always-on broadband
connection over traditional phone lines.
Dynamic IP Address
A temporary IP address assigned by
a DHCP server.
EAP (Extensible Authentication Protocol)
A general
authentication protocol used to control network access.
Many specific authentication methods work within this
framework.
Encryption
Encoding data transmitted in a network.
Ethernet
IEEE standard network protocol that specifies
how data is placed on and retrieved from a common
transmission medium.
Firewall
A set of related programs located at a network
gateway server that protects the resources of a network
from users from
Firmware
The programming code that runs a networking
device.
FTP (File Transfer Protocol)
A protocol used to transfer
files over a TCP/IP network.
Full Duplex
The ability of a networking device to receive
and transmit data simultaneously.
Gateway
A device that interconnects networks with
different, incompatible communications protocols.
Half Duplex
Data transmission that can occur in two
directions over a single line, but only one direction at a
time.
HTTP
(HyperText
Transport
Protocol)
The
communications protocol used to connect to servers on
the World Wide Web.
Infrastructure
A wireless network that is bridged to a
wired network via an access point.
IP (Internet Protocol)
A protocol used to send data over
a network.
IP Address
The address used to identify a computer or
device on a network.
IPCONFIG
A Windows 2000 and XP utility that displays
the IP address for a particular networking device.
Page 60 / 72
µµ
Glossary
Wireless-G VPN Router with RangeBooster
Appendix F
IPSec (Internet Protocol Security)
A VPN protocol used
to implement secure exchange of packets at the IP layer.
ISP (Internet Service Provider)
A company that provides
access to the Internet.
LAN
The computers and networking products that make
up your local network.
MAC (Media Access Control) Address
The unique
address that a manufacturer assigns to each networking
device.
Mask
A filter that includes or excludes certain values, for
example parts of an IP address.
Mbps (MegaBits Per Second)
One million bits per
second; a unit of measurement for data transmission.
NAT (Network Address Translation)
NAT technology
translates IP addresses of a local area network to a different
IP address for the Internet.
Network
A series of computers or devices connected for
the purpose of data sharing, storage, and/or transmission
between users.
Packet
A unit of data sent over a network.
Passphrase
Used much like a password, a passphrase
simplifies the WEP encryption process by automatically
generating the WEP encryption keys for Linksys products.
Ping (Packet INternet Groper)
An Internet utility used
to determine whether a particular IP address is online.
POP³ (Post Office Protocol ³)
A standard mail server
commonly used on the Internet.
Port
The connection point on a computer or networking
device used for plugging in cables or adapters.
Power over Ethernet (PoE)
A technology enabling an
Ethernet network cable to deliver both data and power.
PPPoE (Point to Point Protocol over Ethernet)
A type
of broadband connection that provides authentication
(username and password) in addition to data transport.
PPTP
(Point-to-Point
Tunneling
Protocol)
A
VPN
protocol that allows the Point to Point Protocol (PPP) to
be tunneled through an IP network. This protocol is also
used as a type of broadband connection in Europe.
RADIUS
(Remote
Authentication
Dial-In
User
Service)
A protocol that uses an authentication server to
control network access.
RJ-´µ (Registered Jack-´µ)
An Ethernet connector that
holds up to eight wires.
Roaming
The ability to take a wireless device from
one access point’s range to another without losing the
connection.
Router
A networking device that connects multiple
networks together.
Server
Any computer whose function in a network is to
provide user access to files, printing, communications,
and other services.
SMTP (Simple Mail Transfer Protocol)
The standard e-
mail protocol on the Internet.
SNMP (Simple Network Management Protocol)
A
widely used network monitoring and control protocol.
SPI (Stateful Packet Inspection) Firewall
A technology
that inspects incoming packets of information before
allowing them to enter the network.
SSID (Service Set IDentifier)
Your wireless network’s
name.
Static IP Address
A fixed address assigned to a computer
or device that is connected to a network.
Static Routing
Forwarding data in a network via a fixed
path.
Subnet
(Sub-network)
Subnets
are
portions
of
a
network that share a common address component. In
TCP/IP networks, devices that share a prefix are part of
the same subnet. For example, all devices with a prefix of
157.100.100.100 are part of the same subnet.
Subnet Mask
An address code that determines the size
of the network.
Switch
Filters
and
forwards
packets
between
LAN
segments. Switches support any packet protocol type.
TCP (Transmission Control Protocol)
A network protocol
for transmitting data that requires acknowledgement
from the recipient of data sent.
TCP/IP
(Transmission
Control
Protocol/Internet
Protocol)
A set of instructions PCs use to communicate
over a network.
Telnet
A user command and TCP/IP protocol used for
accessing remote PCs.
Throughput
The amount of data moved successfully
from one node to another in a given time period.
TKIP (Temporal Key Integrity Protocol)
A wireless
encryption protocol that provides dynamic encryption
keys for each packet transmitted.
Topology
The physical layout of a network.
TX Rate
Transmission Rate.
Upgrade
To replace existing software or firmware with a
newer version.
Upload
To transmit a file over a network.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top