time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the
appropriate
computers. Select
Enabled
to filter multicasting, or
Disabled
to disable this feature.
• Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected
and
reinforces your network security by hiding your network ports, so it is more difficult for intruders to
work their
way into your network. Select
Enabled
to block anonymous Internet requests, or
Disabled
to
allow
anonymous Internet requests.
When finished making your changes on this tab, click the
Save Settings
button to save these
changes, or click
the
Cancel Changes
button to undo your changes.
Figure 6-20: Firewall
VPN
Virtual Private Networking (VPN) is a security measure that basically creates a secure connection
between two
remote locations. This connection is very specific as far as its settings are concerned; this is what
creates the
security. The VPN screen, shown in Figure 6-21, allows you to configure your VPN settings to
make your network
more secure.
VPN PassThrough
• IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement
secure
exchange of packets at the IP layer. To allow IPSec Passthrough, click the
Enabled
button. To
disable IPSec
Passthrough, click the
Disabled
button.
• PPTP Pass Through. Point-to-Point Tunneling Protocol Passthrough is the method used to
enable VPN
sessions to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the
Enabled
button. To
disable PPTP Passthrough, click the
Disabled
button.
• L2TP Pass Through. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-
Point Tunneling
Protocol (PPTP) used by to enable the operation of a virtual private network (VPN) over the
Internet.To allow
L2TP Passthrough, click the
Enabled
button. To disable L2TP Passthrough, click the
Disabled
button.
VPN Tunnel
The VPN Router creates a tunnel or channel between two endpoints, so that the data or
information between
these endpoints is secure.
• To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-
down box. It is
possible to create up to 100 simultaneous tunnels. Then click
Enabled
to enable the
VPN Tunnel
.
Once the
tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to
identify
multiple tunnels and does not have to match the name used at the other end of the tunnel. If you
want to route
all the traffic through the tunnel, and not just the ones destined for the remote secure group, click
Enabled
for the
VPN Gateway
.