Chapter3
Advanced Configuration
20
Wreless-G Router for Moble Broadband
Security > VPN
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
IPSec VPN Tunnel
The Router can create an IPSec tunnel or channel between
two endpoints, so that the data or information between
these endpoints is secure.
Select Tunnel Entry
To establish this tunnel, select the
tunnel you wish to create. It is possible to create up to five
simultaneous tunnels.
To delete a tunnel entry, select the tunnel, and then
click
Delete
. To view a summary of the settings, click
Summary
.
VPN Settings Summary
At the top of the screen is the WAN IP address of the
Router. The screen also displays the No., Tunnel Name,
Status, Local Group, Remote Group, Remote Gateway,
and Security Method of the VPN tunnels. Click
Refresh
to
update the information.
VPN > VPN Settings Summary
IPSec VPN Tunnel
Select
Enabled
to enable the IPSec
VPN tunnel.
Tunnel Name
Enter a descriptive name. This lets you
identify multiple tunnels and does not have to match the
name used at the other end of the tunnel.
Local Secure Group
The Local Secure Group is the computer(s) on your network
that can access the tunnel. Specify these computers using
one of the following:
IP Addr.
Select this option to specify a single host.
IP Address
Enter the host’s IP address.
Subnet
Select this option to give an entire local network
access to the tunnel.
IP
Enter the IP address.
Mask
Enter the subnet mask.
Remote Secure Group
The Remote Secure Group is the computer(s) on the
remote end of the tunnel that can access the tunnel.
Specify these computers using one of the following:
IP Addr.
Select this option to specify a single host.
IP Address
Enter the host’s public IP address.
Subnet
Select this option to give an entire remote subnet
access to the tunnel.
IP
Enter the IP address.
Mask
Enter the subnet mask.
Host
Select this option to use the Remote Security
Gateway settings.
Any
Select this option to have the Router accept requests
from any IP address.
Remote Security Gateway
The Remote Security Gateway is the VPN device on the
remote end of the VPN tunnel. The remote VPN device can
be another router, a VPN Server, or a computer with VPN
client software that supports IPSec. Specify the remote
VPN device using one of the following:
•
•
•
•
•
•