Proroute
GEM
2M
4G
Router
GEM-2M series User Manual
97
The Business Security Gateway can behave as a L2TP server and a L2TP client at
the same time.
1.
L2TP:
Check the “Enable” box to activate L2TP client and server functions.
2.
Client/Server:
Choose Server or Client to configure corresponding role of L2TP
VPN tunnels for the Business Security Gateway beneath the choosing screen.
3.2.3.4.1 L2TP
Server
Configuration
The Business Security Gateway can behave as a L2TP server, and it allows remote
hosts to access LAN servers behind the L2TP server. The device can support four
authentication methods: PAP, CHAP, MS-CHAP and MS-CHAP v2. Users can also
enable MPPE encryption when using MS-CHAP or MS-CHAP v2.
1. L2TP Server:
Enable or disable L2TP server function.
2. L2TP over IPSec:
L2TP over IPSec VPNs allow you to transport data over the
Internet, while still maintaining a high level of security to protect data. Enter a
Pre-shared key that system will use it in IPSec tunneling. And when you use some
devices, like Apple related mobile devices, you should also know that key to
establish L2TP over IPSec tunnels.
3. Server Virtual IP:
It is the virtual IP address of L2TP server used in L2TP
tunneling. This IP address should be different from the gateway one and members
of LAN subnet of Business Security Gateway.
4. IP Pool Starting Address:
This device will assign an IP address for each remote
L2TP client. This value indicates the beginning of IP pool.
5. IP Pool Ending Address:
This device will assign an IP address for each remote
L2TP client. This value indicates the end of IP pool.
6. Authentication Protocol:
You can choose authentication protocol as PAP, CHAP,
MS-CHAP, or MS-CHAP v2.