Page 126 / 212 Scroll up to view Page 121 - 125
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
5-18
Virtual Private Networking
v1.0, April 2007
.
7.
In the left frame, click
My Identity
.
8.
From the
Select Certificate
pull-down menu, select
None
.
9.
From the ID Type pull-down menu, select
Domain Name.
The value entered under Domain Name is “.dvfg_remote.com”. In this example, we have
entered
dvfg_remote.com
. Up to 50 users can be served by one policy.
10.
Leave
Virtual Adapter
disabled, and select your computer’s Network Adapter. Your current
IP address will appear.
Figure 5-11
dvfg_local.com
to_dgfv
Page 127 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Virtual Private Networking
5-19
v1.0, April 2007
.
5.
Before leaving the My Identity menu, click
Pre-Shared Key
.
6.
Click
Enter Key
and then enter your preshared key, and click
OK
. This key will be shared by
all users of the DGFV338 policy “home”.
7.
In the left frame, select
Security Policy.
Figure 5-12
Figure 5-13
dgfv_remote.com
to_dgfv
to_dgf
Page 128 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
5-20
Virtual Private Networking
v1.0, April 2007
8.
For the
Phase 1 Negotiation Mode
, check the
Aggressive Mode
radio box.
9.
PFS
should be enabled, and
Enable Replay Detection
should be enabled.
10.
In the left frame, expand
Authentication (Phase 1)
and select
Proposal 1
. The Proposal 1
fields should mirror those in the following figure. No changes should be necessary.
Figure 5-14
Figure 5-15
to_dgfv
Page 129 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Virtual Private Networking
5-21
v1.0, April 2007
11.
In the left frame, expand
Key Exchange (Phase 2)
and select
Proposal 1
. The fields in this
proposal should also mirror those in the following figure. No changes should be necessary.
12.
In the upper left of the window, click the disk icon to save the policy.
Testing the Connection
1.
From your PC, right-click on the VPN client icon
in your Windows toolbar and select
Connect...
, then
My Connections\to_dgfv
.
Within 30 seconds you should receive the message “Successfully connected to My
Connections\to_dgfv” and the VPN client icon in the toolbar should say On:
Figure 5-16
to_dgfv
Page 130 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
5-22
Virtual Private Networking
v1.0, April 2007
2.
For additional status and troubleshooting information, right-click on the VPN client icon Logs
and Connection Status screens in the DGFV338.
Certificate Authorities
Digital Self Certificates are used to authenticate the identity of users and systems, and are issued
by various CAs (Certification Authorities). Digital Certificates are used by this router during the
IKE (Internet Key Exchange) authentication phase as an alternative authentication method. Self
Certificates are issued to you by various CAs (Certification Authorities).
Each CA also issues a CA Identity certificate shown in the
Trusted Certificates (CA
Certificates)
table. This Certificate is required in order to validate communication with the CA. It
is a three-step process. First, you generate a CA request; then, when the request is granted, you
upload the Self Certificate (shown in the
Active Self Certificates
table) and then you upload the
CA Identity certificate (shown in the
Trusted Certificates
table.
The
Trusted Certificates
table lists the certificates generated and signed by a publicly known
organization or authority called the Certificate Authority. The table lists the certificates of each CA
and contains the following data:
CA Identity (Subject Name)
. The organization or person to whom the certificate is issued.
Issuer Name
. The name of the CA that issued the certificate.
Expiry Time
. The date after which the certificate becomes invalid
Figure 5-17

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top