16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

534 Chapter 21<br />

Figure 21.41 : Select the connection type<br />

Another filter rule must be created to allow communication from the router to your<br />

computer. To create this rule, repeat the steps outline in this section, but enter the IP<br />

address of your computer as the Tunnel Endpoint instead of the IP address of the router.<br />

21.4.1.4 Assigning the <strong>Security</strong> Policy<br />

Finally, you must assign your new security policy to the local computer. In the Local<br />

<strong>Security</strong> Settings window, right-click the new policy that you have just created and select<br />

Assign , as shown in Figure 21.42 .<br />

Your computer is now configured to communicate over a VPN tunnel.<br />

21.4.2 Enabling the VPN on the Linksys WRV54G<br />

Now that your computer is configured to communicate over an IPSec VPN tunnel, you<br />

must configure the WRV54G to communicate with your computer. Using your web<br />

browser, type the IP Address of the WRV54G into your address bar. This is 192.168.1.1,<br />

by default. You will be prompted for your username and password .<br />

From the setup screen, select <strong>Security</strong> | VPN to display the VPN settings, as seen in<br />

Figure 21.43 .<br />

Select the Enabled radio button for VPN Tunnel. Choose a name for this tunnel and<br />

enter it in the Tunnel Name textbox. Next, enter the IP address and netmask of the local<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!