16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Implementing Advanced <strong>Wireless</strong> <strong>Security</strong> 531<br />

Figure 21.36 : The Filter Properties window<br />

this accordingly. Enter the subnet mask for your network in the Subnet Mask field. By<br />

default, this is 255.255.255.0. Choose My IP Address in the Destination Address field<br />

( Figure 21.36 ).<br />

Click the OK button to close this window. Next, click OK in Windows XP or Close in<br />

Windows 2000. This filter is used for communication from the router to your computer.<br />

21.4.1.3 Establishing the Tunnel Rules<br />

The rules that are employed by the tunnels must be set up in order to properly filter traffic<br />

through the VPN tunnel. First, select the tunnel you created for communication from<br />

your computer to the router and then click the Filter Action tab. Next, select the Require<br />

<strong>Security</strong> radio button and click Edit to open the Require <strong>Security</strong> Properties window, as<br />

shown in Figure 21.37 .<br />

Ensure that the Negotiate security radio button is selected. Then, deselect Accept<br />

unsecured communication, but always respond using IPSec and select Session key perfect<br />

forward security (PFS) , as shown in Figure 21.38 .<br />

Click OK to return to the New Rule Properties window. Select the Authentication<br />

Methods tab and click Edit to open the Edit Authentication Method Properties window.<br />

Choose the Use this string (preshared key) radio button and enter the pre-shared key in<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!