ASUS sl500 Manuel
A
PPLICATION
N
OTES
–
C
REATING AN
IKE IP
SEC
T
UNNEL
B
ETWEEN AN
I
NTERNET
S
ECURITY
R
OUTER AND A
W
INDOWS
2000/XP PC
Copyright 2003, ASUSTeK Computer, Inc.
Page
30
Figure 3.5. The Inbound ACL Rule Settings for the VPN Policy
Figure 3.6. Inbound ACL Summary
4 Verify the IPSec VPN Connection
There are several ways to check if the IVPN connection is good or bad. You may start with the simplest tool (i.e.
ping) to check if the VPN connection is OK and then venture into more complex tools to look for problems or find
out details with the VPN connection.
ping) to check if the VPN connection is OK and then venture into more complex tools to look for problems or find
out details with the VPN connection.
4.1 ping
The
“ping” program is the simplest utility to check if there is a connection between network nodes. However, ping
alone cannot tell what is wrong with the connection if there is a problem with the connection. You can open a
“Command Prompt” window, as shown in the following figure, and ping PC1 from PC2 by entering “ping
192.168.1.10
“Command Prompt” window, as shown in the following figure, and ping PC1 from PC2 by entering “ping
192.168.1.10
” (assuming IP of PC1 is 192.168.1.10) or ping PC2 from PC1 by entering “ping 192.168.19.166” at
the command prompt to check if the VPN connection is established. You will receive several
“Negotiating IP
Security
” responses initially (if you ping PC1 from PC2) during the negotiation of IPSec VPN tunnel. Repeat the
“ping” command, and you will receive successful ping responses in a few more tries.
Make sure
“Enable” is selected for VPN.
New inbound ACL