VPN
Site-to-Site IPsec VPN
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
107
6
g.
Redundant Remote Identifier Type
—Select the redundant remote identifier
type from the drop down list:
Local Wan IP, IP Address, FQDN, User-FDQN
, or
DER ASN1 DN.
STEP 3
NetBIOS
: Computers running Microsoft Windows® communicate with one
another through NetBIOS broadcast packets. Enable NetBIOS to access remote
network resources by browsing the Windows® Network Neighborhood.
STEP 4
In the
Local Traffic Selection
and
Remote Traffic Selection
sections:
•
In
the
Local IP and Remote IP
fields, indicate how many endpoints will be
part of the VPN policy:
-
Single
—Limits the policy to one host. Enter the IP address of the host that
will be part of the VPN in the
IP Address
field.
-
Subnet
—Allows an entire subnet to connect to the VPN. Enter the
network address in the
IP Address
field, and enter the subnet mask in the
Subnet Mask
field. Enter the subnet’s network IP address in the
IP
Address
field. Enter the subnet mask, such as 255.255.255.0, in the
Subnet Mask
field. The field automatically displays the default subnet
address based on the IP address.
NOTE
Do not use overlapping subnets for remote or local traffic selectors. Using these
subnets would require adding static routes on the router and the hosts to be used.
For example, avoid:
Local Traffic Selector: 192.168.1.0/24
Remote Traffic Selector: 192.168.0.0/16
STEP 5
Split DNS
—Allow the router to find the DNS server of the remote router without
going through the ISP (Internet). If you enable Split DNS, also enter these settings:
Domain Name Server 1-2, Domain 1-6. Domain Name Server1-2 will resolve the
Domain Name 1-6.
STEP 6
Manual Policy Parameters
—For a
Manual
policy type, enter the settings in the
Manual Policy Parameters
section:
•
Protocol
—Select the protocol from the drop down list: ESP or AH.
•
SPI-Incoming, SPI-Outgoing
—Enter a hexadecimal value between 3 and 8
characters; for example, 0x1234. Security Parameter Index (SPI) identifies
the Security Association of the incoming and outgoing traffic streams.
•
Encryption Algorithm
—Select the algorithm used to encrypt the data.