42
Chapter 6: Configuring the Wireless-G VPN Router
The VPN Tab - IPSec VPN
Wireless-G VPN Router with RangeBooster
Remote Secure Group
The Remote Secure Group is the computer(s) on the remote end of the tunnel that can access the tunnel. From
the drop-down menu, select
Subnet
, to include the entire network for the tunnel; select
IP address
if you want a
specific computer; IP Range, if you want to include a range of IP addresses; select
Host
, if the VPN will terminate
at the Router, instead of the PC; or
Any
, to allow any computer to access the tunnel. The screen will change
depending on the selected option. The options are described below.
Subnet
. Enter the IP Address and Mask of the remote VPN router in the fields provided. To allow access to the
entire IP subnet, enter
0
for the last set of IP Addresses. (e.g. 192.168.1.0).
IP Addr
. Enter the IP Address of the remote VPN router. The Mask will be displayed.
Host
. The VPN tunnel will terminate at the router with this setting. Use Port Range Forwarding to direct traffic to
the correct computer. Refer to the Port Range Forwarding tab of the Firewall tab.
Any
. Allows any computer to access the tunnel.
Remote Secure Gateway
The Remote Secure Gateway is the VPN device, such as a second VPN router, on the remote end of the VPN
tunnel. Enter the IP Address of the VPN device at the other end of the tunnel. The remote VPN device can be
another VPN router, a VPN server, or a computer with VPN client software that supports IPSec. The IP address may
either be static (permanent) or dynamic, depending on the settings of the remote VPN device.
If the IP Address is static, select
IP Addr.
and enter the IP address. Make sure that you have entered the IP
address correctly, or the connection cannot be made. Remember, this is NOT the IP address of the local VPN
Router; it is the IP address of the remote VPN router or device with which you wish to communicate. If the IP
address is dynamic, select
FQDN
for DDNS or
Any
. If FQDN is selected, enter the domain name of the remote
router, so the Router can locate a current IP address using DDNS. If Any is selected, then the Router will accept
requests from any IP address.
Key Management
Key Exchange Method
. IKE is an Internet Key Exchange protocol used to negotiate key material for Security
Association (SA). IKE uses the Pre-shared Key to authenticate the remote IDE peer. Select
Auto (IKE)
for the Key
Exchange Method. Both ends of a VPN tunnel must use the same mode of key management. The settings
available on this screen may change, depending on the selection you have made.
Encryption
. Using encryption also helps make your connection more secure. There are two different types of
encryption: DES or 3DES (3DES is recommended because it is more secure). You may choose either of these, but
Figure 6-38: Local Secure Group - IP Address
and Remote Secure Group - IP Address
Figure 6-39: Local Secure Group - Host
and Remote Secure Group - IP Addr.
Figure 6-40: Local Secure Group - IP Addr.
and Remote Secure Group - Any
Summary of Contents for WRV200
Page 1: ...Model No VPN Router with RangeBooster Wireless G WRV200 WIRELESS GHz 2 4802 11g User Guide ...
Page 10: ...Wireless G VPN Router with RangeBooster ...
Page 124: ...114 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...
Page 125: ...115 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...
Page 126: ...116 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...