16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

526 Chapter 21<br />

can provide. The W-RV54G offers all of the security features of other access points, but<br />

also provides the capability of setting up an IPSec VPN tunnel. A VPN tunnel allows<br />

two points to establish an encrypted session using a selected protocol. Other protocols<br />

can then be transmitted through this tunnel. A basic example of this is a Secure Shell<br />

(SSH) tunnel. A firewall can be configured to allow only SSH traffic (port 22) inbound.<br />

The client can then tunnel other traffic, such as HTTP (port 80) through the established<br />

SSH tunnel. This both encrypts the HTTP traffic, and removes the requirement to allow<br />

port 80 traffic through the firewall. Additionally, because some form of authentication<br />

(passphrase, key exchange, or both) is required to establish the initial SSH tunnel,<br />

additional user level access controls are in place.<br />

This section describes the process of setting up an IPSec tunnel to utilize the VPN<br />

features on the WRKV54G. First, we discuss the steps that must be taken on Windows<br />

2000 or XP clients to prepare for VPN access. Then, the configuration steps that are<br />

required on the WRKV54G are detailed.<br />

21.4.1 Preparing Windows 2000 or XP Computers for Use with the WRV54G<br />

There are four steps that you need to take to configure your Windows 2000 or XP<br />

computer to establish a VPN tunnel with the WRV54G.<br />

1. Create an IPSec policy.<br />

2. Build two filter lists.<br />

3. Establish the tunnel rules.<br />

4. Assign the IPSec policy to the computer.<br />

21.4.1.1 Creating an IPSec Policy<br />

Click Start | Run and type secpol.msc in the Open textbox to open the Local <strong>Security</strong><br />

Settings screen, as seen in Figure 21.28 .<br />

Right-click IP <strong>Security</strong> Policies on Local Computer and select Create IP <strong>Security</strong> Policy to<br />

open the IP <strong>Security</strong> Policy Wizard. Click Next on the IP <strong>Security</strong> Policy Wizard window.<br />

Enter a name for your security policy in the Name textbox (as shown in Figure 21.29 ) and<br />

click Next .<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!