Changes

Line 8: Line 8:     
* One RUTxxx router of any type
 
* One RUTxxx router of any type
* One Cisco router of any type
+
* One Cisco router (this configuration example was created using Cisco RV340W)
 
* At least one router must have a Public Static or Public Dynamic IP address
 
* At least one router must have a Public Static or Public Dynamic IP address
 
* At least one end device (PC, Laptop, Tablet, Smartphone) to configure the routers
 
* At least one end device (PC, Laptop, Tablet, Smartphone) to configure the routers
Line 15: Line 15:  
==Configuration scheme==
 
==Configuration scheme==
   −
[[File:Networking_rutxxx_configuration_example_ipsec_topology_v1.png|border|class=tlt-border|1100x1100px]]
+
[[File:Networking_rutxxx_configuration_example_ipsec_topology_v2.png|border|class=tlt-border|1100x1100px]]
    
==RUT configuration==
 
==RUT configuration==
Line 49: Line 49:  
# Write '''Pre-shared key''' (a shared password used for authentication between the peers. The value of this field must match on both instances).
 
# Write '''Pre-shared key''' (a shared password used for authentication between the peers. The value of this field must match on both instances).
 
# Add '''Secret's ID selector''' (Cisco LAN IP).
 
# Add '''Secret's ID selector''' (Cisco LAN IP).
# Press '''Save'''
+
# Press '''Save'''.
    
==Cisco configuration==
 
==Cisco configuration==
Line 55: Line 55:  
Connect to router's WebUI, go to '''VPN > IPsec Profiles''' and apply the following configuration.
 
Connect to router's WebUI, go to '''VPN > IPsec Profiles''' and apply the following configuration.
   −
[[File:Networking_rutxxx_configuration_example_ipsec_cisco_profiles_v1.png|border|class=tlt-border]]
+
[[File:Networking_rutxxx_configuration_example_ipsec_cisco_profiles_v2.png|border|class=tlt-border]]
    
# Add '''Profile Name''' (anything you want).
 
# Add '''Profile Name''' (anything you want).
Line 71: Line 71:  
# Select '''Group: Group''' (5).
 
# Select '''Group: Group''' (5).
   −
When you are do with '''IPsec Profiles''', save settings, go to '''Site-to-Site''' settings and apply the following configuration:
+
When you are done with '''IPsec Profiles''', save settings, go to '''Site-to-Site''' settings and apply the following configuration:
    
[[File:Networking_rutxxx_configuration_example_ipsec_cisco_s2s_v2.png|border|class=tlt-border]]
 
[[File:Networking_rutxxx_configuration_example_ipsec_cisco_s2s_v2.png|border|class=tlt-border]]
Line 81: Line 81:  
# Write '''RUT Public IP'''.
 
# Write '''RUT Public IP'''.
 
# Add '''Pre Shared Key''' (a shared password used for authentication between the peers. The value of this field must match on both instances).
 
# Add '''Pre Shared Key''' (a shared password used for authentication between the peers. The value of this field must match on both instances).
# Disable '''Minimum Key complexity''.
+
# Disable '''Minimum Key complexity'''.
# Select '''Local Identifier Type''' (IP address).
+
# Select '''Local Identifier Type''' (IP Address).
 
# Write '''Local Identifier''' (Cisco LAN IP address).
 
# Write '''Local Identifier''' (Cisco LAN IP address).
 
# Select '''Local IP Type''' (Subnet).
 
# Select '''Local IP Type''' (Subnet).
# IP Address: Local network
+
# Write '''IP Address''' (Cisco local network).
# Subnet Mask: Network Mask
+
# Add '''Subnet Mask''' (network mask).
# Remote Identifier Type: Remote WAN IP
+
# Select '''Remote Identifier Type''' (Remote WAN IP).
# Remote Identifier: 192.168.10.1
+
# Write '''Remote Identifier''' (RUT LAN IP).
# Remote IP Type: Subnet
+
# Select '''Remote IP Type''' (Subnet).
# IP Address: 192.168.10.0
+
# Add '''IP Address''' (RUT local network).
# Subnet Mask: 255.255.255.0
+
# Add '''Subnet Mask''' (RUT local network mask).
    
==Testing the setup==
 
==Testing the setup==
0

edits

Navigation menu