27
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Security Tab - VPN Passthrough
Wireless-G Travel Router with SpeedBooster
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, L2TP, or PPTP protocols to pass through the
Router’s firewall.
VPN Passthrough
IPSec Passthrough
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer.
IPSec Pass-Through is enabled by default. To disable IPSec Passthrough, select
Disabled
.
L2TP Passthrough
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. L2TP Pass-Through is enabled by default. To disable L2TP Passthrough, select
Disabled
.
PPTP Passthrough
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Pass-Through is enabled by default. To disable PPTP Passthrough, select
Disabled
.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
The Security Tab - VPN
Use the settings on this tab to create VPN tunnels. The Wireless-G Travel Router creates a tunnel or channel
between two endpoints, so that the data or information between these endpoints is secure.
VPN Tunnel
Establishing a Tunnel
The Router creates a tunnel or channel between two endpoints, so that the data or information between these
endpoints is secure. To establish this tunnel, select the tunnel you wish to create in the
Select Tunnel Entry
drop-
down menu. It is possible to create up to two simultaneous tunnels. To delete a tunnel, click the
Delete
button.
To view a summary of that tunnel, click the
Summary
button. The
VPN Settings Summary
screen displays the
number, name, local group, remote group, remote gateway, and security method.
Then check the box next to
Enable
to enable the tunnel. Once the tunnel is enabled, enter the name of the tunnel
in the
Tunnel Name
field. This is to allow you to identify multiple tunnels and does not have to match the name
used at the other end of the tunnel.
ipsec
: a VPN protocol used to implement
secure exchange of packets at the IP layer.
pptp
: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe.
Figure 5-25: Security Tab - VPN Passthrough
Figure 5-26: Security Tab - VPN