
4.
Web Management
AirLive AirMax4GW User’s Manual
109
4.2.3.4 L2TP
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol
used to support virtual private networks (VPNs) or as part of the delivery of services
by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies
on an encryption protocol that it passes within the tunnel to provide privacy.
The Business Security Gateway can behave as a L2TP server and a L2TP client at
the same time.
1.
L2TP:
Check the “Enable” box to activate L2TP client and server functions.
2.
Client/Server:
Choose Server or Client to configure corresponding role of
L2TP VPN tunnels for the Business Security Gateway beneath the choosing
screen.
4.2.3.4.1 L2TP Server Configuration
The Business Security Gateway can behave as a L2TP server, and it allows remote
hosts to access LAN servers behind the L2TP server. The device can support four
authentication methods: PAP, CHAP, MS-CHAP and MS-CHAP v2. Users can also
enable MPPE encryption when using MS-CHAP or MS-CHAP v2.
1.
L2TP Server:
Enable or disable L2TP server function.
2.
L2TP over IPSec:
L2TP over IPSec VPNs allow you to transport data over
the Internet, while still maintaining a high level of security to protect data.
Enter a Pre-shared key that system will use it in IPSec tunneling. And when
you use some devices, like Apple related mobile devices, you should also
know that key to establish L2TP over IPSec tunnels.
3.
Server Virtual IP:
It is the virtual IP address of L2TP server used in L2TP
tunneling. This IP address should be different from the gateway one and
members of LAN subnet of Business Security Gateway.