Page 96 / 177 Scroll up to view Page 91 - 95
96
|
Chapter 6.
Virtual Private Networking
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
4.
Click
Connect
for the VPN tunnel that you want to activate.
Activating the VPN Tunnel by Pinging the Remote Endpoint
Note:
This section uses 192.168.3.1 for a sample remote endpoint LAN IP
address.
To activate the VPN tunnel by pinging the remote endpoint (for example, 192.168.3.1),
perform the following steps depending on whether your configuration is client-to-gateway or
gateway-to-gateway:
Client-to-gateway configuration
. To check the VPN connection, you can initiate a
request from the remote PC to the N300 Wireless Dual Band ADSL2+ Modem Router
DGND3300v2’s network by using the Connect option in the NETGEAR ProSafe menu
bar. The NETGEAR ProSafe client reports the results of the attempt to connect. Since the
remote PC has a dynamically assigned WAN IP address, it must initiate the request.
To perform a ping test using our example, start from the remote PC:
a.
Establish an Internet connection from the PC.
b.
On the Windows taskbar, click the
Start
button, and then select
Run
.
c.
Type
ping -t 192.168.3.1
,
and then click
OK
.
This causes a continuous ping to be sent to the first N300 Wireless Dual Band
ADSL2+ Modem Router DGND3300v2. Within 2 minutes, the ping response should
change from
timed out
to
reply
.
Note:
You can use
Ctrl-C
to stop the pinging.
Running a ping test
to the LAN from the PC
Downloaded from
www.Manualslib.com
manuals search engine
Page 97 / 177
Chapter 6.
Virtual Private Networking
|
97
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
Once the connection is established, you can open a browser on the PC and enter the
LAN IP address of the remote N300 Wireless Dual Band ADSL2+ Modem Router
DGND3300v2. After a short wait, you should see the login screen of the N300 wireless
modem router (unless another PC already has the N300 Wireless Dual Band ADSL2+
Modem Router DGND3300v2 management interface open).
Gateway-to-gateway configuration
. Test the VPN tunnel by pinging the remote network
from a PC attached to Gateway A (the N300 wireless modem router).
a.
Open a command prompt (for example,
Start > Run > cmd
).
b.
Type
ping 192.168.3.1
.
Note:
The pings might fail the first time. If they do, then try the pings a
second time.
Start Using a VPN Tunnel to Activate It
To use a VPN tunnel, use a Web browser to go to a URL whose IP address or range is
covered by the policy for that VPN tunnel.
Verifying the Status of a VPN Tunnel
To use the VPN Status screen to determine the status of a VPN tunnel:
1.
Log in to the N300 wireless modem router.
2.
On the main menu, select
VPN Status
to display the VPN Status/Log screen.
Downloaded from
www.Manualslib.com
manuals search engine
Page 98 / 177
98
|
Chapter 6.
Virtual Private Networking
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
This log shows the details of recent VPN activity, including the building of the VPN tunnel.
If there is a problem with the VPN tunnel, refer to the log for information about what might
be the cause of the problem.
Click
Refresh
to see the most recent entries.
Click
Clear Log
to delete all log entries.
3.
On the VPN Status/Log screen, click
VPN Status
to display the Current VPN Tunnels (SAs)
screen.
This table lists the following data for each active VPN tunnel.
SPI
. Each SA has a unique SPI (Security Parameter Index) for traffic in each
direction. For manual key exchange, the SPI is specified in the policy definition. For
automatic key exchange, the SPI is generated by the IKE protocol.
Policy Name
. The VPN policy associated with this SA.
Remote Endpoint
. The IP address on the remote VPN endpoint.
Action
. Either a Drop or a Connect button.
SLifeTime (Secs)
. The remaining soft lifetime for this SA in seconds. When the soft
lifetime becomes 0 (zero), the SA (security association) is renegotiated.
HLifeTime (Secs)
. The remaining hard lifetime for this SA in seconds. When the hard
lifetime becomes 0 (zero), the SA (security association) is terminated. (It is
reestablished if required.)
Deactivating a VPN Tunnel
Sometimes a VPN tunnel must be deactivated for testing purposes. You can deactivate a
VPN tunnel from two places:
Policy table on VPN Policies screen
VPN Status screen
Downloaded from
www.Manualslib.com
manuals search engine
Page 99 / 177
Chapter 6.
Virtual Private Networking
|
99
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
Using the Policy Table on the VPN Policies Screen to Deactivate a VPN Tunnel
To use the VPN Policies screen to deactivate a VPN tunnel:
1.
Log in to the N300 wireless modem router.
2.
On the main menu, select
VPN Policies
to display the VPN Policies screen.
3.
In the Policy Table, clear the
Enable
check box for the VPN tunnel that you want to
deactivate, and then click
Apply
. (To reactivate the tunnel, select the
Enable
check box, and
then click
Apply
.)
Using the VPN Status Screen to Deactivate a VPN Tunnel
To use the VPN Status screen to deactivate a VPN tunnel:
1.
Log in to the N300 wireless modem router.
2.
On the main menu, select
VPN Policies
to display the VPN Policies screen.
Downloaded from
www.Manualslib.com
manuals search engine
Page 100 / 177
100
|
Chapter 6.
Virtual Private Networking
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
3.
Click
VPN Status
. The Current VPN Tunnels (SAs) screen displays:
4.
Click
Drop
for the VPN tunnel that you want to deactivate.
Deleting a VPN Tunnel
To delete a VPN tunnel:
1.
Log in to the N300 wireless modem router.
2.
On the main menu, select
VPN Policies
to display the VPN Policies screen. In the Policy
Table, select the radio button for the VPN tunnel to be deleted, and then click
Delete
.
Setting Up VPN Tunnels in Special Circumstances
When the VPN Wizard and its VPNC defaults (see
Table
2
on page
79) are not appropriate
for your circumstances, use one of these alternatives:
Auto Policy
. For a typical automated Internet Key Exchange (IKE) setup, see
Using Auto
Policy to Configure VPN Tunnels
on page
101. Auto Policy uses the IKE protocol to
define the authentication scheme and automatically generate the encryption keys.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top