Page 116 / 145 Scroll up to view Page 111 - 115
106
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
10. Go to the
IP Filter List
tab, and click the filter list
Router->win
.
11. Click the
Filter Action
tab, and select the filter action
Require Security
. Then, click the
Edit
button. From the
Security Methods
tab, verify that the
Negotiate security
option is enabled, and deselect the
Accept
unsecured communication, but always respond using IPSec
check box. Select
Session key Perfect
Forward Secrecy
, and click the
OK
button.
12. Click the
Authentication Methods
tab, and verify that the authentication method
Kerberos
is selected. Then,
click the
Edit
button.
Figure D-19: IP Filter List Tab
Figure D-20: Filter Action Tab
Figure D-21: Authentication Methods Tab
Page 117 / 145
107
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
13. Change the authentication method to
Use this string to protect the key exchange
(preshared key)
, and
enter the preshared key string, such as XYZ12345. (This is a sample key string. Yours should be a key that is
unique but easy to remember.) Then click the
OK
button.
14. This new Preshared key will be displayed. Click the
Apply
button to continue, if it appears on your screen;
otherwise, proceed to the next step.
15. Click the
Tunnel Setting
tab. Click the radio button for
The tunnel endpoint is specified by this IP
Address
, and enter the Windows 2000/XP computer’s IP Address.
Figure D-22: Preshared Key
Figure D-23: New Preshared Key
Figure D-24: Tunnel Setting Tab
Page 118 / 145
108
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
16. Click the
Connection Type
tab, and select
All network connections
. Then click the
OK
or
Close
button to
finish.
17. From the
Rules
tab, click the
OK
or
Close
button to return to the screen showing the security policies.
Step 4: Assign New IPSec Policy
In the
IP Security Policies on Local Machine
window, right-click the policy named
to_Router
, and click
Assign
. A
green arrow appears in the folder icon.
Figure D-25: Connection Type
Figure D-26: Rules
Figure D-27: Local Computer
Page 119 / 145
109
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
Step 5: Create a Tunnel Through the Web-Based Utility
1.
Open your web browser, and enter
192.168.1.1
in the
Address
field. Press the
Ente
r key.
2.
When the
User name
and
Password
fields appear, enter the default user name and password,
admin
. Press
the
Enter
key.
3.
From the
Setup
tab, click the
VPN
tab.
4.
From the
VPN
tab, select the tunnel you wish to create in the
Select Tunnel Entry
drop-down box. Then click
Enabled
. Enter the name of the tunnel in the
Tunnel Name
field.
This is to allow you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel.
5.
Enter the IP Address and Subnet Mask of the local VPN Router in the
Local Secure Group
fields. To allow
access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0).
6.
Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router
or device with which you wish to communicate) in the
Remote Security Router
fields.
7.
Select from two different types of encryption:
DES
or
3DES
(3DES is recommended because it is more
secure).
You may choose either of these, but it must be the same type of encryption that is being used by the
VPN device at the other end of the tunnel.
Or, you may choose not to encrypt by selecting Disable.
8.
Select from two types of authentication:
MD5
and
SHA
(SHA is recommended because it is more secure).
As
with encryption, either of these may be selected, provided that the VPN device at the other end of the tunnel
is using the same type of authentication.
Or, both ends of the tunnel may choose to
Disable
authentication.
9.
Select the Key Management. Select
Auto (IKE)
and enter a series of numbers or letters in the
Pre-shared Key
field. Check the box next to
PFS
(Perfect Forward Secrecy) to ensure that the initial key exchange and IKE
proposals are secure. You may use any combination of up to 24 numbers or letters in this field. No special
characters or spaces are allowed. In the
Key Lifetime
field, you may optionally select to have the key expire at
the end of a time period you designate.
Enter the number of seconds you’d like the key to be useful, or leave
it blank for the key to last indefinitely.
10. Click the
Save Settings
button to save these changes.
Your tunnel should now be established.
Figure D-28: VPN Tab
Page 120 / 145
110
Wireless-G VPN Broadband Router
Appendix E: Configuring VPN Tunnels
Overview
Appendix E: Configuring VPN Tunnels
Overview
This appendix has two sections. The first explains how to configure a VPN IPSec tunnel between two VPN
Routers. The second explains how to connect a QuickVPN client to the VPN Router.
Before You Begin
The following is a list of equipment you need:
Two Windows desktop PCs (each PC will be connected to a VPN Router)
One QuickVPN client (a Windows notebook or desktop PC with QuickVPN software installed)
Two VPN Routers
NOTE:
Each computer must have a network
adapter installed.
Figure E-1: Diagram of All VPN Tunnels

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top