Proroute GEM420 4G M2M Router
GEM420 User Manual
134
Business Security Gateway
can go to access Internet via remote PPTP server.
By default, it is enabled. However, if you want the remote PPTP
Server to
monitor the Intranet of local Business Security Gateway, the option can’t be
enabled.
10.
LCP Echo Type:
Choose the way to do connection keep alive. By default, it is
“Auto” option that means system will automatically decide the time interval
between two LCP echo requests and the times that system can retry once
system LCP echo fails. You also can choose “User-defined” option to define the
time interval and the retry times by yourself. The last option is “Disable”.
11.
Tunnel
: Check the “Enable” box to activate the tunnel.
3.2.3.3 L2TP
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol
used to support virtual private networks (VPNs) or as part of the delivery of services
by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies
on an encryption protocol that it passes within the tunnel to provide privacy.
The Business Security Gateway can behave as a L2TP server and a L2TP client at
the same time.
1.
L2TP:
Check the “Enable” box to activate L2TP client and server functions.
2.
Client/Server:
Choose Server or Client to configure corresponding role of L2TP
VPN tunnels for the Business Security Gateway beneath the choosing screen.
3.2.3.3.1 L2TP Server Configuration
The Business Security Gateway can behave as a L2TP server, and it allows remote
hosts to access LAN servers behind the L2TP server. The device can support four
authentication methods: PAP, CHAP, MS-CHAP and MS-CHAP v2. Users can also
enable MPPE encryption when using MS-CHAP or MS-CHAP v2.