Configuring Virtual Private Networks (VPNs) and Security
Configuring Security
STEP 1
STEP 2
Configuring Security
Cisco RV180/RV180W Administration Guide
Configuring VPN Passthrough
VPN passthrough allows VPN traffic that originates from VPN clients to pass
through the router. For example, if you are not using a VPN that is configured on the
Cisco RV180/RV180W, but are using a laptop to access a VPN at another site,
configuring VPN passthrough allows that connection.
To open this page: In the navigation tree, choose VPN > IPsec > VPN
Passthrough.
Choose the type of traffic to allow to pass through the router:
•
IPsec—Check Enable to allow IP security tunnels to pass through the router.
•
PPTP—Check Enable to allow Point-to-Point Tunneling Protocol tunnels to
pass through the router.
•
L2TP—Check Enable to allow Layer 2 Tunneling Protocol tunnels to pass
through the router.
Click Save to save your settings, or click Cancel to reload the page with the
current settings.
The Cisco RV180/RV180W provides several security methods, including
certificate authentication, RADIUS server support, and 802. 1 x port-based
authentication.
Using SSL Certificates for Authentication
The Cisco RV180/RV180W uses digital certificates for IPsec VPN authentication
and SSL validation (for HTTPS and SSL VPN authentication). You can obtain a
digital certificate from a well-known Certificate Authority (CA) such as VeriSign, or
generate and sign your own certificate using functionality available on this
gateway. The gateway comes with a self-signed certificate, and this can be
replaced by one signed by a CA as per your networking requirements. A CA
certificate provides strong assurance of the server's identity and is a requirement
for most corporate network VPN solutions.
5
121