R E V I E W D R A F T # 1 — C I S C O C O N F I D E N T I A L
B-18
Cisco WRP500 Administration Guide
Appendix B Data Fields
Access Restrictions
Security > VPN Passthrough
Access Restrictions
The Access Restrictions module includes the following pages:
•
“Access Restrictions > Internet Access” on page 18
Access Restrictions > Internet Access
IPSec Passthrough
Internet Protocol Security (IPSec) is a suite of
protocols used to implement secure exchange of
packets at the IP layer. When this feature is enabled,
IPSec tunnels are allowed to pass through the WRP500.
Default: Enabled
PPTP
Passthrough Point-to-Point Tunneling Protocol (PPTP)
allows the Point-to-Point Protocol (PPP) to be tunneled
through an IP network. When this feature is enabled,
PPTP tunnels are allowed to pass through the WRP500.
Default: Enabled
L2TP Passthrough
Layer 2 Tunneling Protocol is the method used to
enable Point-to-Point sessions via the Internet on the
Layer 2 level. When this feature is enabled, L2TP
tunnels are allowed to pass through the WRP500.
Default: Enabled
Enter Policy Name
A name for the policy
Status
Policies are disabled by default. To enable the selected
policy, select
Enabled
.
Applied PCs
The computers that will be affected by the policy that
you selected in the Access Policy list.
•
MAC Address: The MAC address of the device.
•
IP Address: The final octet of the IP address.
•
IP Address Range: A range of devices, identfied by
the final octet of the starting IP address and the
final octect of the ending IP address.