Solved

office VPN multiple users

Posted on 2014-09-08
3
484 Views
Last Modified: 2014-09-23
Hi All,
I have to setup a VPN with the Bell 2864 modem and the Cisco RV320.
They told me at Bell that their modem / router is all I need. I do believe that.
I have the other Cisco rv320 just in case. I am planning on bridging the 2864 and using the RV320 as a router / vpn. I have read that it is easy but this is the first vpn that i have had to setup.
I need to know how to do this or just a brief tutorial on how to setup the routers. The rv320 is not wireless so I will have to setup a wap router off the rv320 as well. The remote users are only going to need access to some shares on the server, Please help me out. Thanks
0
Comment
Question by:RandyTech
  • 3
3 Comments
 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
Comment Utility
You have asked two very distinct questions that are unrelated.

I have a Cisco RV042 VPN router and a Cisco 220 Wireless router hooked up two. I have tunnels built to clients that work on the wired Windows 7 desktop or my wireless Windows 8 laptop.

1. For IPsec VPN, you need to set up the connection points, phase 1 and phase 2, the IKE policies, the pre-shared key and set the miscellaneous variables. There is a lot to VPN so you should get a start and then ask specific questions. The phases and IKE policies need to be the same at both ends and the subnets on each end must be different.

2. To hook up wireless, hook up a LAN port on the wireless router to a LAN port on the VPN router, give the wireless router a static IP address on the VPN router, and turn DHCP OFF on the wireless router. That will make it an access point on the network.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
Also if you wish to set up remote users, you need a client to gateway connection, set up the policies on the office router and then provide a VPN client to the remote users.  I use NCP Secure Entry.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
@RandyTech - Thank you and I was happy to help.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now