free hit counter

Configuring Vpn Passthrough; Configuring Security; Using Ssl Certificates For Authentication - Cisco RV180 Administrator's Manual

Hide thumbs Also See for RV180:
Table of Contents

Advertisement

Configuring Virtual Private Networks (VPNs) and Security

Configuring Security

STEP 1
STEP 2
Configuring Security
Cisco RV180/RV180W Administration Guide

Configuring VPN Passthrough

VPN passthrough allows VPN traffic that originates from VPN clients to pass
through the router. For example, if you are not using a VPN that is configured on the
Cisco RV180/RV180W, but are using a laptop to access a VPN at another site,
configuring VPN passthrough allows that connection.
To open this page: In the navigation tree, choose VPN > IPsec > VPN
Passthrough.
Choose the type of traffic to allow to pass through the router:
IPsec—Check Enable to allow IP security tunnels to pass through the router.
PPTP—Check Enable to allow Point-to-Point Tunneling Protocol tunnels to
pass through the router.
L2TP—Check Enable to allow Layer 2 Tunneling Protocol tunnels to pass
through the router.
Click Save to save your settings, or click Cancel to reload the page with the
current settings.
The Cisco RV180/RV180W provides several security methods, including
certificate authentication, RADIUS server support, and 802. 1 x port-based
authentication.

Using SSL Certificates for Authentication

The Cisco RV180/RV180W uses digital certificates for IPsec VPN authentication
and SSL validation (for HTTPS and SSL VPN authentication). You can obtain a
digital certificate from a well-known Certificate Authority (CA) such as VeriSign, or
generate and sign your own certificate using functionality available on this
gateway. The gateway comes with a self-signed certificate, and this can be
replaced by one signed by a CA as per your networking requirements. A CA
certificate provides strong assurance of the server's identity and is a requirement
for most corporate network VPN solutions.
5
121

Advertisement

Table of Contents
loading