CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC



Similar documents
How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

How To Industrial Networking

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Windows XP VPN Client Example

Configuring IPsec VPN with a FortiGate and a Cisco ASA

1 PC to WX64 direction connection with crossover cable or hub/switch

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Configure IPSec VPN Tunnels With the Wizard

VPN Wizard Default Settings and General Information

Configuring a VPN for Dynamic IP Address Connections

Configure VPN between ProSafe VPN Client Software and FVG318

Laboratory Exercises V: IP Security Protocol (IPSec)

Configuring SSH Sentinel VPN client and D-Link DFL-500 Firewall

Chapter 6 Basic Virtual Private Networking

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

How To Configure Apple ipad for Cyberoam L2TP

Configuring IPsec VPN between a FortiGate and Microsoft Azure

TechNote. Configuring SonicOS for MS Windows Azure

Lab Configuring Access Policies and DMZ Settings

This chapter describes how to set up and manage VPN service in Mac OS X Server.

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Chapter 6 Virtual Private Networking

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Chapter 5 Virtual Private Networking Using IPsec

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version /2004

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

AirStation VPN Setup Guide WZR-RS-G54

Deploying Windows Streaming Media Servers NLB Cluster and metasan

WatchGuard Mobile User VPN Guide

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Chapter 8 Virtual Private Networking

Setting up D-Link VPN Client to VPN Routers

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Chapter 4 Virtual Private Networking

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

If you have questions or find errors in the guide, please, contact us under the following address:

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

How to setup a VPN on Windows XP in Safari.

Internet Protocol Security (IPSec)

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Fireware How To Network Configuration

7. Configuring IPSec VPNs

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Global VPN Client Getting Started Guide

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Global VPN Client Getting Started Guide

Guide to Setting up Internet Connection Sharing for Windows

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

TechNote. Configuring SonicOS for Amazon VPC

Setting Up Your FTP Server

How To Set Up Checkpoint Vpn For A Home Office Worker

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Pre-lab and In-class Laboratory Exercise 10 (L10)

Windows Server 2008 R2 Initial Configuration Tasks

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469)

Broadband Router ESG-103. User s Guide

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Using IPsec VPN to provide communication between offices

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring the WT-4 for ftp (Ad-hoc Mode)

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Objectives. Background. Required Resources. CCNA Security

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Configuring a FortiGate unit as an L2TP/IPsec server

Quick Installation Guide DAP Wireless N 300 Access Point & Router

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

Best Practices: Pass-Through w/bypass (Bridge Mode)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Chapter 2 Preparing Your Network

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Configuring SSL VPN on the Cisco ISA500 Security Appliance

1. Hardware Installation

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

SCCM Client Checklist for Windows 7

IPSec Pass through via Gateway to Gateway VPN Connection

Allworx Installation Course

Transcription:

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel between an ASUS Internet Security Router and a PC running Microsoft Windows 2000 or XP. It is assumed that both sides have static IP address for the WAN interface, and a default route configured. All settings and screen dumps contained in this application notes are taken from a Microsoft Windows 2000/XP, and an ASUS Internet Security Router. You may change the IP address, subnet mask and default gateway IP address of any device to match your true network environment. 2 Network Setup Connect all the devices as indicated in Figure 2.1. The IKE IPSec tunnel ends at the Internet Security Router and PC2. Note that in the actual applications, the Internet Security Router and the Windows 2000/XP PC are most likely connected via the Internet instead of a switch as shown in Figure 2.1. 7x 8x 9x 10x 11x 12x 7x 8x 9x 10x 11x 12x Ethernet C A 789101112 123456 1x 2x 3x 4x A 5x 6x 1x 2x 3x 4x B 5x 6x Switch Internet Security Router WAN: 192.168.18.146 LAN: 192.168.1.1 PC2: 192.168.19.166 PC1: 192.168.1.10 Windows 2000/XP Figure 2.1. Network Diagram 2.1 Configure the IP Address of the Windows PC PC2 1. Open the Internet Protocol (TCP/IP) Properties dialog box a) For Windows 2000, click on Start Ł select Settings Ł click on Network and Dial-up Connections icon Ł right click on Local Area Connection icon or the icon that represents your PC s network card Ł select Properties Ł double click on Internet Protocol (TCP/IP). b) For Windows XP, click on Start Ł select Control Panel Ł click on Network Connections icon Ł right click on Local Area Connection icon the icon that represents your PC s network card Ł select Properties Ł double click on Internet Protocol (TCP/IP). 2. Set a static IP address 192.168.19.166 (see Figure 2.2) a) Click on Use the following IP address: radio button. b) Enter IP address, subnet mask and default gateway as illustrated in Figure 2.2. Copyright 2003, ASUSTeK Computer, Inc. Page 1

Figure 2.2. Configure the IP address of the Windows 2000/XP PC 2.1.1 Verify the Routing Table in the Windows 2000/XP After the IP address and default gateway have been properly configured for your PC, enter route print command in the Command Prompt window to verify the routing table. Default route entry Figure 2.3. Verify the Routing Table in Windows 2000/XP Make sure that the default gateway is set to 192.168.18.146 in the default route entry. Note that the default route entry is indicated by 0.0.0.0 for both the network destination and netmask. Copyright 2003, ASUSTeK Computer, Inc. Page 2

2.2 Configure the IP Address of the Internet Security Router You need to login as admin in order to configure the settings for the Internet Security Router. 2.2.1 Configure the WAN Port Click on the WAN menu and then click on the WAN submenu to access WAN Configuration page. Make sure the settings for IP address, subnet mask and the gateway address are set exactly as shown in Figure 2.4. You may ignore the settings for the primary and secondary DNS settings. 2.2.2 Configure the LAN Port Figure 2.4. Configure WAN Port for the Internet Security Router Click on the LAN menu and then click on the IP submenu to access LAN Configuration page. Make sure the settings for IP address, and subnet mask are set exactly as shown in Figure 2.5. Figure 2.5. Configure LAN Port for the Internet Security Router 2.2.3 Verify the Routing Table in the Internet Security Router Click on the Routing menu to access Routing Configuration page. Make sure that a default route is exactly the same as what is shown in Figure 2.6. Default route is indicated by 0.0.0.0 for both the destination IP and the destination netmask. Copyright 2003, ASUSTeK Computer, Inc. Page 3

Default route Figure 2.6. Routing Table in the Internet Security Router 3 Configure IKE IPSec VPN Settings on Windows 2000/XP Using Automatic Keying Note that Microsoft Windows OS does not support manual key mode for IKE IPSec VPN. Only automatic keying using preshared key will be demonstrated in this document. Three steps are involved this configuration: Create a custom MMC (Microsoft Management Console) Configure VPN policies in Windows 2000/XP Configure an outbound VPN policy in Windows 2000/XP Configure an inbound VPN policy in Windows 2000/XP 3.1 Create a Custom MMC (Microsoft Management Console) Console 1. Start the MMC console: From the Windows desktop, click on Start, and then click on Run. Enter mmc in the pop-up Run dialog window (as shown in the figure below) and then click on the OK button to continue. 2. The MMC console window displays. Click on the Console menu, and then select the Add/Remove Snap-in submenu. Copyright 2003, ASUSTeK Computer, Inc. Page 4

3. In the Add/Remove Snap-in dialog box, click on the Add button to continue. 4. In the Add Standalone Snap-in dialog box, select IP Security Policy Management (you may need to scroll down the list to see this item) and then click on the Add button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 5

Select IP Security Policy Management 5. Select Local computer which will be managed by this IP security policy and click the Finish button. Select Local computer 6. Click the Close button. Copyright 2003, ASUSTeK Computer, Inc. Page 6

7. You can see that IP Security Policies on Local Machine is added. Click the OK button to return to the MMC console window. Copyright 2003, ASUSTeK Computer, Inc. Page 7

3.2 Configure VPN Policies in Windows 2000/XP 3.2.1 Configure an Outbound VPN Policy in Windows 2000/XP 1. In the MMC console window, right-click on the IP Security Policies on Local Machine (on the left hand pane of the MMC console window) and then select Create IPSec Security Policy from the context menu as shown in the following figure. 2. IP Security Policy Wizard dialog box displays. Click the Next button to continue. 3. Name the IP security policy, SL1000_Policy, and then click the Next button to continue. Note that you may enter a detail description for this policy in the Description text box. Copyright 2003, ASUSTeK Computer, Inc. Page 8

4. Clear the Activate the default response rule check box, and then click the Next button to continue. Make sure this check box is cleared. 5. Make sure the Edit Properties check box is checked (it is by default), and then click the Finish button. Copyright 2003, ASUSTeK Computer, Inc. Page 9

Make sure this check box is checked. 6. In the SL1000_Policy Properties dialog box, make sure that the Use Add Wizard check box in the lower-right corner is checked, and then click the Add button to start the Security Rule Wizard. Make sure this check box is checked. 7. Click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 10

8. Select The tunnel endpoint is specified by this IP address:, enter 192.168.18.146 as the tunnel endpoint for this rule and then click the Next button to continue. 9. Select All network connections as the network type and then click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 11

10. Select Use this string to protect the key exchange (preshared key): as the authentication method and enter 1234 as the preshared key. Make sure that this preshared key matches what is configured for the Internet Security Router. To make it more secure, you may choose a longer string. Note that you must not use a blank string for the preshared key. Click the Next button to continue. 11. In the IP Filter List dialog box, click the Add button. A list of IP filter is displayed. Copyright 2003, ASUSTeK Computer, Inc. Page 12

12. Name your filter WIN_SL1000 and click the Add button to continue. 13. Select My IP Address as the Source address, select A specific IP Subnet and enter 192.168.1.0/255.255.255.0 as the Destination address. Clear the Mirrored check box and then click the OK button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 13

Make sure Mirrored check box is cleared. 14. Click the Close button to close the IP Filter List dialog box. 15. In the Security Rule Wizard dialog box, select the newly created IP filter, WIN_SL1000, and click the Next button to configure Filter Action. Copyright 2003, ASUSTeK Computer, Inc. Page 14

Select this item. 16. In the Filter Action dialog box, check the Use Add Wizard check box and then click the Add button to continue. Make sure this box is checked. 17. Click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 15

18. Name this filter action, Action1, and click the Next button to continue. 19. In the Filter Action General Options dialog box, select Negotiate security, and then click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 16

20. Select Do not communicate with computers that do not support IPSec from the Filter Action Wizard page, and then click the Next button to continue. 21. Select High {Encapsulated Secure Payload} from the list of security methods, and click the Next button to conitnue. Copyright 2003, ASUSTeK Computer, Inc. Page 17

22. Make sure the Edit Properties check box is cleared (this is the default setting), and then click the Finish button to close Filter Action Wizard dialog box. Make sure this box is cleared. 23. In the Filter Action dialog box, select Action1 for this security rule and then click the Next button to close the Filter Action dialog box. Copyright 2003, ASUSTeK Computer, Inc. Page 18

24. Make sure the Edit Properties check box is cleared (this is the default setting), and then click the Finish button to close the Security Rule Wizard. Make sure this box is cleared. 3.2.2 Configure an Inbound VPN Policy in Windows 2000/XP 1. Check the Use Add Wizard option and then click the Add button to create another IP Security Rule. Copyright 2003, ASUSTeK Computer, Inc. Page 19

Make sure this box is checked. 2. Click the Next button to continue. 3. Select The tunnel endpoint is specified by this IP address:, enter 192.168.19.166 as the tunnel endpoint for this rule and then click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 20

4. Select All network connections as the network type and then click the Next button to continue. 5. Select Use this string to protect the key exchange (preshared key): as the authentication method and enter 1234 as the preshared key. Make sure that this preshared key matches what is configured for the Internet Security Router. To make it more secure, you may choose a longer string. Note that you must not use a blank string for the preshared key. Click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 21

6. In the IP Filter List dialog box, click the Add button. A list of IP filter is displayed. 7. Name your filter, SL1000_WIN, and click the Add button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 22

8. Select A specific IP Subnet from the Source address: drop-down list and enter 192.168.1.0/255.255.255.0 as the Source address and select My IP Address as the Destination address. Clear the Mirrored check box and then click the OK button to continue. Make sure Mirrored check box is cleared. 9. Click the Close button to close the IP Filter List dialog box. Copyright 2003, ASUSTeK Computer, Inc. Page 23

10. In the Security Rule Wizard dialog box, select the newly created security rule, SL1000_WIN, and click the Next button to configure Filter Action. Select this item. 11. Select Action1 as the filter action and then click the Next button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 24

Select Action1 as the filter 12. Click the Finish button to close the Security Rule Wizard. 13. Click the Close button to complete the IPSec configuration task. Copyright 2003, ASUSTeK Computer, Inc. Page 25

14. Right-click the SL1000_Policy, and select Assign from the context menu. 15. You can see that a green dot appears on the lower right corner of the icon. It identifies that SL1000_Policy has been assigned as an active IPSec policy. The status in the Policy Assigned column should change from No to Yes. Copyright 2003, ASUSTeK Computer, Inc. Page 26

Green dot Changed from No to Yes 3.3 Configure the Internet Security Router You need to login as admin to the Internet Security Router in order to configure the Internet Security Router. The procedure involves VPN policy setup, firewall outbound and inbound ACL rules. 3.3.1 Configure VPN Policy Click the VPN menu and then click the VPN Tunnel submenu to access the VPN Tunnel configuration page. Configure the VPN policy based on the settings listed in Table 3.1. When done with the configuration, click the Add button to create the VPN policy. Please see Figure 3.1 for reference. Table 3.1 VPN Policy Settings for the Internet Security Router Field Purpose Value Tunnel Name Enter a unique name to identify the connection SL1000_Policy Site to Site radio button Make it a site-to-site VPN connection Selected Local Secure Group Select address, subnet or IP range Subnet 192.168.1.0/255.255.255.0 Remote Secure Group Select address, subnet or IP range IP Address 192.168.19.166 Remote Gateway Select Any, IP range or FQDN IP Address 192.168.19.166 Preshared Key A hexadecimal or ASCII shared secret 1234 IKE Mode Select Main mode or Aggressive Mode Main Copyright 2003, ASUSTeK Computer, Inc. Page 27

Figure 3.1. VPN Policy Configuration Settings After the new VPN policy is created, you can see it displayed in the Site to Site Access List Rules as shown in Figure 3.2. New VPN policy Figure 3.2. Verify the New VPN Policy 3.3.2 Configure an Outbound ACL Rule for the VPN Policy This step is needed only when firewall is enabled. To allow outbound traffic to pass through the firewall, an outbound ACL rule is required; otherwise, the outbound traffic will be blocked by the firewall. Click the Firewall Copyright 2003, ASUSTeK Computer, Inc. Page 28

menu and then click the Outbound ACL submenu to access the Outbound ACL configuration page. Enter the outbound ACL settings in the firewall Outbound ACL configuration page as shown in Figure 3.3. Click the Add button to create the new rule when done with the configuration. The newly created ACL rule will be displayed in the Outbound Access Control List table as shown in Figure 3.4. Make sure Enable is selected for VPN. Figure 3.3. The Outbound ACL Rule Settings for the VPN Policy Figure 3.4. Outbound ACL Summary New outbound ACL 3.3.3 Configure an Inbound ACL Rule for the VPN Policy This step is needed only when firewall is enabled. To accept the inbound traffic originated from the remote secure group, an inbound ACL rule is required; otherwise, the inbound traffic will be blocked by the firewall. Click the Firewall menu and then click the Inbound ACL submenu to access the Inbound ACL configuration page. Enter the inbound ACL settings in the firewall Inbound ACL configuration page as shown in Figure 3.5. Click the Add button to create the new rule when done with the configuration. The newly created ACL rule will be displayed in the Inbound Access Control List table as shown in Figure 3.6. Copyright 2003, ASUSTeK Computer, Inc. Page 29

Make sure Enable is selected for VPN. Figure 3.5. The Inbound ACL Rule Settings for the VPN Policy New inbound ACL Figure 3.6. Inbound ACL Summary 4 Verify the IPSec VPN Connection There are several ways to check if the IVPN connection is good or bad. You may start with the simplest tool (i.e. ping) to check if the VPN connection is OK and then venture into more complex tools to look for problems or find out details with the VPN connection. 4.1 ping The ping program is the simplest utility to check if there is a connection between network nodes. However, ping alone cannot tell what is wrong with the connection if there is a problem with the connection. You can open a Command Prompt window, as shown in the following figure, and ping PC1 from PC2 by entering ping 192.168.1.10 (assuming IP of PC1 is 192.168.1.10) or ping PC2 from PC1 by entering ping 192.168.19.166 at the command prompt to check if the VPN connection is established. You will receive several Negotiating IP Security responses initially (if you ping PC1 from PC2) during the negotiation of IPSec VPN tunnel. Repeat the ping command, and you will receive successful ping responses in a few more tries. Copyright 2003, ASUSTeK Computer, Inc. Page 30

Ping response during negotiation of the VPN tunnel. Successful Ping response. Figure 4.1. Ping Example for Verifying IPSec VPN Connection 4.2 Monitor IPSec VPN Traffic on the Internet Security Router The Internet Security Router comes with the monitoring tool for the IPSec VPN traffic. Click the VPN menu and then click the Statistics submenu to see the VPN Statistics page, as shown in Figure 4.2. This page shows information regarding IKE (Internet Key Exchange) and IPSec. You may use it to find out problems w/ the IPSec traffic. For example, if there is a problem during IKE, the Phase1 Status column will display a message for the problem. To find out details on IPSec SA (security association), click the icon to display the IPSec SA page as shown in Figure 4.3. Copyright 2003, ASUSTeK Computer, Inc. Page 31

Click this icon to display details on IPSec SA. Figure 4.2. VPN Statistics on the Internet Security Router Copyright 2003, ASUSTeK Computer, Inc. Page 32

4.3 ipsecmon Figure 4.3. IPSec SA Example 4.3.1 Windows 2000 Windows 2000 includes a program called ipsecmon for monitoring the IPSec VPN traffic. If you cannot find it in your computer, you may download it from Microsoft website. This program provides details about your IPSec VPN traffic, such as IPSec/IKE statistics, information about connecting parties and etc. To run ipsecmon, click Start, click Run, enter ipsecmon in the Run dialog box and then click the OK button. The IP Security Monitor is then displayed as shown in Figure 4.4. Copyright 2003, ASUSTeK Computer, Inc. Page 33

4.3.2 Windows XP Figure 4.4. IP Security Monitor Example For Windows XP, ipsecmon is integrated into MMC console. Follow the instructions below to install and use ipsecmon. 1. Start the MMC console: From the Windows desktop, click on Start, and then click on Run. Enter mmc in the pop-up Run dialog window (as shown in the figure below) and then click on the OK button to continue. 2. The MMC console window displays. Click on the Console menu, and then select the Add/Remove Snap-in submenu. Copyright 2003, ASUSTeK Computer, Inc. Page 34

3. In the Add/Remove Snap-in dialog box, click on the Add button to continue. 4. In the Add Standalone Snap-in dialog box, select IP Security Monitor (you may need to scroll down the list to see this item) and then click on the Add button to continue. Copyright 2003, ASUSTeK Computer, Inc. Page 35

Select IP Security Monitor 5. Click the Close button. 6. You can see that IP Security Monitor is added. Click the OK button to return to the MMC console window. Copyright 2003, ASUSTeK Computer, Inc. Page 36

7. MMC console displays. Click on the + symbol to expand available options for IP Security Monitor. Click + to expand available options. 8. The following figure shows all the available options for IP Security Monitor. You may click any of the options to find out detail information regarding your IPSec VPN connection. Copyright 2003, ASUSTeK Computer, Inc. Page 37

Name of your computer Available options Copyright 2003, ASUSTeK Computer, Inc. Page 38