31
Chapter 6: Configuring the Wireless-G VPN Broadband Router
The Security Tab - VPN
Wireless-G VPN Broadband Router
The Security Tab - VPN
Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two
remote locations.
This connection is very specific as far as its settings are concerned; this is what creates the
security.
The VPN screen allows you to configure your VPN settings to make your network more secure.
VPN PassThrough
IPSec Passthrough
. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the
Enabled
button. To disable IPSec Passthrough,
click the
Disabled
button.
PPTP Pass Through
. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be
tunneled through an IP network. To allow PPTP Passthrough, click the
Enabled
button. To disable PPTP
Passthrough, click the
Disabled
button.
L2TP Passthrough
. Layer 2 Tunneling Protocol Passthrough is the method used to enable Point-to-Point
sessions via the Internet on the Layer 2 level. To allow L2TP Passthrough, click the
Enabled
button. To disable
L2TP Passthrough, click the
Disabled
button.
VPN Tunnel
The VPN Broadband Router creates a tunnel or channel between two endpoints, so that the data or information
between these endpoints is secure.
Select Tunnel Entry
. To establish this tunnel, select the tunnel you wish to create from the drop-down box.
It is
possible to create up to 100 simultaneous tunnels.
VPN Tunnel
. Click
Enabled
to enable the selected VPN Tunnel.
VPN Gateway
. If you want to route all the traffic through the tunnel, and not just the ones destined for the remote
secure group, click
Enabled
.
Tunnel Name
. Once the tunnel is enabled, enter the name of the tunnel.
This allows you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel.
Local Secure Group
The Local Secure Group is the computer(s) on your LAN that can access the tunnel. From the drop-down menu,
select
Subnet
, to include the entire network for the tunnel; select
IP Address
if you want a specific computer;
IP
Range
, if you want to include a range of IP addresses; or select
Host
, which is used with Port Forwarding to
Figure 6-21: Security Tab - VPN
Figure 6-22: Local Secure Group - Subnet
and Remote Secure Group - Subnet