VPN
Site-to-Site IPsec VPN
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 107
6
g. Redundant Remote Identifier Type—Select the redundant remote identifier
type from the drop down list: Local Wan IP, IP Address, FQDN, User-FDQN, or
DER ASN1 DN.
STEP 3 NetBIOS: Computers running Microsoft Windows® communicate with one
another through NetBIOS broadcast packets. Enable NetBIOS to access remote
network resources by browsing the Windows® Network Neighborhood.
STEP 4 In the Local Traffic Selection and Remote Traffic Selection sections:
• In the Local IP and Remote IP fields, indicate how many endpoints will be
part of the VPN policy:
- Single—Limits the policy to one host. Enter the IP address of the host that
will be part of the VPN in the IP Address field.
- Subnet—Allows an entire subnet to connect to the VPN. Enter the
network address in the IP Address field, and enter the subnet mask in the
Subnet Mask field. Enter the subnet’s network IP address in the IP
Address field. Enter the subnet mask, such as 255.255.255.0, in the
Subnet Mask field. The field automatically displays the default subnet
address based on the IP address.
NOTE Do not use overlapping subnets for remote or local traffic selectors. Using these
subnets would require adding static routes on the router and the hosts to be used.
For example, avoid:
Local Traffic Selector: 192.168.1.0/24
Remote Traffic Selector: 192.168.0.0/16
STEP 5 Split DNS—Allow the router to find the DNS server of the remote router without
going through the ISP (Internet). If you enable Split DNS, also enter these settings:
Domain Name Server 1-2, Domain 1-6. Domain Name Server1-2 will resolve the
Domain Name 1-6.
STEP 6 Manual Policy Parameters—For a Manual policy type, enter the settings in the
Manual Policy Parameters section:
• Protocol —Select the protocol from the drop down list: ESP or AH.
• SPI-Incoming, SPI-Outgoing—Enter a hexadecimal value between 3 and 8
characters; for example, 0x1234. Security Parameter Index (SPI) identifies
the Security Association of the incoming and outgoing traffic streams.
• Encryption Algorithm—Select the algorithm used to encrypt the data.