Solved

Setting up a Cisco to work with Watchguard VPN

Posted on 2014-10-17
3
480 Views
Last Modified: 2014-10-22
We have a Watchguard XTM520 at our headquarters. We have purchased a Cisco RV130W to setup at a branch office. I have setup many Branch Office VPN's connecting XTM25W's to out XTM520, but not sure what to setup in the Cisco RV130W to work with the Watchguard Branch Office VPN? Step be step instructions would be great if anyone has any?
0
Comment
Question by:jvillareal78
  • 2
3 Comments
 
LVL 12

Expert Comment

by:DarinTCH
ID: 40387836
0
 
LVL 93

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40387886
Here are the settings I have on a Cisco RV042G to hook up to some Juniper clients.

Tunnel Name       (Provide a name)
Tunnel Number      1
Interface       WAN 1
Enabled         yes
Local Group Setup      
Local Gateway Type      IP Only
IP Address: external IP
Local Security Group Type      Subnet
IP Address      192.168.n.0
Subnet Mask      255.255.255.0
Remote Group Setup      
Remote Gateway Type      IP Only
IP Address      external IP
Remote Security Group Type      Subnet
IP Address      192.168.m.0
Subnet Mask      255.255.255.0
IP Sec Setup      
Keying Mode      IKE Pre-share
Phase 1 DH Group  2
Phase 1 Encryption      3DES
Phase 1 Authentication      SHA1
Phase 1 SA Life      28800 Sec.
PFS      No
Phase 2 DH Group   2
Phase 2 Encryption      3DES
Phase 2 Authentication      SHA1
Phase 2 SA Life      3600 Sec.
Pre-shared Key      key at both ends
Advanced +      
Aggressive      No
Compress (IP Payload Comp)      No
Keep Alive      Yes
AH Hash (MD5)      No
Net Bios Broadcast      No
NAT Traversal      Yes
Dead Peer Detect (10 Sec)      

See if this example helps.
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 40398047
@jvillareal78  - Thank you and I was happy to help.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question