EasyManuals Logo
Home>Cisco>Network Router>RV180W

Cisco RV180W Administration Guide

Cisco RV180W
187 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #133 background imageLoading...
Page #133 background image
Configuring VPN and Security
Configuring Security
Cisco RV180/RV180W Administration Guide 124
5
L2TP—Check Enable to allow Layer 2 Tunneling Protocol tunnels to pass
through the router.
STEP 2 Click Save to save your settings, or click Cancel to reload the page with the
current settings.
Configuring Security
The Cisco RV180/RV180W provides several security methods, including
certificate authentication, RADIUS server support, and 802.1x port-based
authentication.
Using SSL Certificates for Authentication
The Cisco RV180/RV180W uses digital certificates for IPsec VPN authentication
and SSL validation (for HTTPS and SSL VPN authentication). You can obtain a
digital certificate from a well-known Certificate Authority (CA) such as VeriSign, or
generate and sign your own certificate using functionality available on this
gateway. The gateway comes with a self-signed certificate, and this can be
replaced by one signed by a CA as per your networking requirements. A CA
certificate provides strong assurance of the server's identity and is a requirement
for most corporate network VPN solutions.
A self certificate is a certificate issued by a CA identifying your device (or self-
signed if you don't want the identity protection of a CA). To request a self
certificate to be signed by a CA, you can generate a Certificate Signing Request
from the gateway by entering identification parameters and sending to the CA for
signing. Once signed, the CA's Trusted Certificate and signed certificate from the
CA are uploaded to activate the self-certificate validating the identity of this
gateway. The self certificate is then used in IPsec and SSL connections with peers
to validate the gateway's authenticity.
To configure certificates, choose Security > SSL Certificate. You can choose the
following options:
Trusted Certificates—Upload a certificate from a trusted authority (for
example, a certificate Authority such as Microsoft or VeriSign).
See Uploading a Trusted Certificate.

Table of Contents

Other manuals for Cisco RV180W

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RV180W and is the answer not in the manual?

Cisco RV180W Specifications

General IconGeneral
BrandCisco
ModelRV180W
CategoryNetwork Router
LanguageEnglish

Related product manuals