The objective of this document is to show how to use the Shrew Soft VPN client to connect to an RV340 Series
You can download the latest version of the Shrew Soft VPN client software here:
Applicable Devices | Software Version
Introduction / Use Case
IPSec VPN (Virtual Private Network) allows you to securely obtain remote resources by establishing an
tunnel across the Internet. The RV34X series routers work as IPSEC VPN servers and support the Shrew
Client. This guide will show you hoe to configure your router and the Shrew Soft Client to secure a
to a VPN.
This document has two parts:
Configure the RV34X Series Router:
We will start by configuring the Client-to-Site VPN on the RV34x
In VPN > Client-to-Site,
add a Client-to-Site VPN profile
Select the Cisco VPN Client option.
Check the Enable box to make the VPN Client Profile active. We will also configure the
Name, select the WAN interface, and enter a Pre-shared Key.
Note: Please note the Group Name and Pre-shared Key
will be used later when configuring the client.
Leave the User Group Table blank for now. This is for the User Group on the
we have not configured it yet. Make sure the Mode is set to Client.
Pool Range for Client LAN. We will use 172.16.10.1 through 172.16.10.10.
Note: The Pool Range should use a unique subnet that isn’t used elsewhere on the
Here is where we configure the Mode Configuration settings. Here are the settings we
Primary DNS Server: If you have an internal DNS Server or want to use an
Server, you can enter it here. Otherwise, the default is set to the RV340 LAN IP address. We
the default in our example.
Split Tunnel: Check to enable Split Tunneling. This is used to specify which
will go over the VPN tunnel. We will use Split Tunnel in our example.
Split Tunnel Table: Enter the networks the VPN client should have access to over
VPN. This example uses the RV340 LAN network.
After clicking Save, we can see the Profile in the IPSec Client-to-Site
We will now configure a User Group to use for Authenticating VPN client users. In
Configuration > User Groups, click on ‘+’ to add a
Enter a Group Name.
In the Services section > EzVPN/3rd Party, click
link this User Group to the Client-to-Site Profile we configured earlier.
You should now see the Client-to-Site Group Name in the list for EzVPN/3rd
After you Apply the User Group configuration, you will see it in the User
Groups list and it will show the new User Group will be used with the Client-to-Site
We will now configure a new User in System Configuration > User
Click on ‘+’ to create a new User.
Enter the new User Name along with the New Password. Verify that the
Group is set to the new User Group we just configured. Click
Apply when finished.
The new User will show up in the list of Local Users.
This completes the configuration on the RV340 Series Router. We will now configure the Shrew Soft VPN
Configure the ShrewSoft VPN client
We will now configure the Shrew Soft VPN client.
Open the ShrewSoft VPN Access Manager and click Add to add a Profile. In the
Site Configuration window that appears, configure the General tab:
Hostname or IP Address: Use the WAN ip address (or hostname of the RV340)
Auto Configuration: Select ike config pull
Adapter Mode: Select Use a Virtual adapter and assigned address
Configure the Client tab. We will just use the default settings.
In the Name Resolution tab > DNS tab, check the Enable
box and leave the Obtain Automatically boxes checked.
In the Name Resolution tab > WINS tab, check the Enable
WINS box and leave the Obtain Automatically box checked.
Configure the Authentication tab > Local Identity tab:
In the Authentication tab > Remote Identity tab, we will leave the
In the Authentication tab > Credentials tab, configure the
For the Phase 1 tab, we will leave the default settings in place:
We will also use the defaults for the Phase 2 tab:
For the Policy tab, we will use the following settings:
Policy Generation Level: Auto
Maintain Persistent Security Associations: Checked
Obtain Topology Automatically or Tunnel All: Checked
Since we configured Split-Tunneling on the RV340, we don’t need to configure it
When finished, click Save.
We’re now ready to test the connection. In VPN Access Manager, highlight the connection profile
click on the Connect button.
In the VPN Connect window that comes up, enter the Username and
Password using the credentials for the User Account we created on the
(step 13 & 14).
When finished, click Connect.
Verify the tunnel is connected. You should see tunnel enabled.
There it is, you are now setup to connect to your network via VPN.