Applicable Devices


If you choose DES as encryption method in Step 3, enter a 16 digit hexadecimal value. Keep Alive helps to re-establish the connections immediately if any connection becomes inactive. AES is recommended as it is the most secure encryption method. A warning message window appears:. Enter the static IP address in the field. If you would like to import a certificate from your PC to the router, go to the Import Certificate section. Enter the key to encrypt and decrypt data in the Encryption Key field.


A Virtual Private Network VPN is a way to connect endpoints on different networks together over a public network, such as the Internet. A useful application of VPNs is that a remote user with VPN client software can securely access information on a private network as long as they have access to the Internet.

Certificates are generated by the router and are used to ensure that both the router and QuickVPN user are secure. From the router, you can export the certificate that can be used by the QuickVPN client.

Enter the password again to confirm it in the Confirm New Password field. Optional To allow the user to change their password, click the Yes radio button. Optional To edit any information about a user, click the specific user in the table.

Edit the necessary information and then click Update. You can not edit the username. However, a certificate will increase the security of the VPN. Scroll down to the Certificate Management area. The current certificate is displayed in the Existing Certificate field. If you would like to export a certificate to your PC, go to the Export Certificate section. If you would like to import a certificate from your PC to the router, go to the Import Certificate section. Optional To generate a new certificate for the router, click Generate.

This replaces the previous certificate with the new certificate. Remote users with Microsoft VPN client software can access to the tunnel through the software. Internet Protocol Security IPSec is an internet layer security protocol which provides end-to-end security through authentication and encryption during any communication session. Also the Perfect Forward Secrecy key must be same on the both side of the tunnel.

Choose the appropriate mode of key management to ensure security from the Keying Mode drop-down list. The default mode is IKE with Preshared key. You can enter from to ffffffff. Choose the appropriate encryption method for the data from the Encryption drop-down list. The recommended encryption is 3DES. The VPN tunnel needs to use the same encryption method for both ends. Choose the appropriate authentication method for the data from the Authentication drop-down list.

The VPN tunnel needs to use the same authentication method for both ends. Enter the key to encrypt and decrypt data in the Encryption Key field. If you choose DES as encryption method in Step 3, enter a 16 digit hexadecimal value. If you choose 3DES as encryption method in Step 3, enter a 40 digit hexadecimal value. Enter a pre-shared key to authenticate the traffic in Authentication Key field. If you choose MD5 as authentication method in step 4, enter 32 digit hexadecimal value.

If you choose SHA as authentication method in Step 4, enter 40 digit hexadecimal value. The VPN tunnel needs to use the same preshared key for both of its ends. Phase 1 is used to establish the simplex, logical security association SA between the two ends of the tunnel to support secure authenticate communication. Diffie-Hellman DH is a cryptographic key exchange protocol which is used to determine the strength of the key during Phase 1 and it also shares the secret key to authenticate the communication.

But it takes less time to compute the IKE keys. This option is preferred if the speed of the network is low. But it needs some time to compute the IKE keys. It needs more time to compute the IKE keys. It is preferred if the speed of the network is high. Choose the appropriate Phase 1 Encryption to encrypt the key from the Phase 1 Encryption drop-down list. The VPN tunnel needs to use the same encryption method for both of its ends. AES is the most secure encryption method.

Choose the appropriate Phase 1 authentication method from the Phase 1 Authentication drop-down list. The VPN tunnel needs to use the same authentication method for both of its ends. Check the Perfect Forward Secrecy check box to provide more protection to the keys. This option allows the router to generate a new key if any key is compromised. The encrypted data is only compromised through the compromised key. So it provides more secure and authenticate communication as it secures other keys though a key is compromised.

This is a recommended action as it provides more security. Phase 2 uses security association and it is used to determine the security of the data packet during the data packets pass through the two end points.

But it needs less time to compute the IKE keys. It is preferred if the speed of the network is low. Choose the appropriate Phase 2 Encryption to encrypt the key from the Phase 2 Encryption drop-down list. AES is recommended as it is the most secure encryption method.


Leave a Reply

How to Buy print email feedback. Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV, RV, RVG and RV VPN Routers Article ID: . The Cisco RV Dual WAN VPN Router is a proven solution that delivers highly secure, high performance connectivity at the heart of your small business network. Solved: The question is in the title, i want to make the Windows client compatible with the VPN of my RV because Shrew Soft VPN fail to etablish tunel after little time and QuickVPN don't support Windows 7 or any 64 bit version of Windows.