Linksys WRT54G3G-VN manual Security Tab VPN Passthrough, Access Restrictions Tab Internet Access

Page 42

Wireless-G Router for Mobile Broadband

The Security Tab - VPN Passthrough

Use this screen to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.

VPN Passthrough

IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click Enable. IPSec Passthrough is enabled by default.

PPTP Passthrough. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click Enable. PPTP Passthrough is enabled by default.

L2TP Passthrough. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click Enable. L2TP Passthrough is enabled by default.

Change these settings as described here, and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.

The Access Restrictions Tab - Internet Access

The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, websites, and inbound traffic during specific days and times.

Internet Access

Internet Access Policy. Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Settings button is clicked). Selecting a policy from the drop-down menu will display that policy’s settings. To delete a policy, select that policy’s number and click the Delete button. To view all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the policy or policies and clicking the Delete button. To return to the Internet Access tab, click the Close button.)

Status. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and click the radio button beside Enable.

To create an Internet Access policy:

1. Select a number from the Internet Access Policy drop-down menu.

Chapter 5: Configuring the Wireless-G Router for Mobile Broadband

Figure 5-31: Security Tab - VPN Passthrough

Figure 5-32: Access Restrictions Tab - Internet Access

35

The Security Tab - VPN Passthrough

Image 42
Contents 802 GHz .11g Wireless- G How to Use This User Guide Copyright and TrademarksWord definition Table of Contents Common Problems and Solutions Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Appendix C Upgrading Firmware Appendix D Windows HelpList of Figures Router’s Ports17 Setup Tab Advanced Routing Router 51 Status Tab Wireless Introduction WelcomeWhat’s in this User Guide? Wireless-G Router for Mobile Broadband Ssid service set identifier your wireless network’s name Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyPlanning Your Wireless Network Network Layout Getting to Know the Wireless-G Router for Mobile Broadband Router’s PortsRouter’s LEDs Router’s LEDs are located on the Router’s other side panelRouter’s Data Card Slot Connecting the Wireless-G Router for Mobile Broadband OverviewConnect Your Computer Hardware Installation for Connection to Your Broadband Modem Connect the Power Hardware Installation for Connection to Another Router Diagram for Connection to Another RouterConnect Your Computer Placement Options Stand OptionWall-Mount Option 11 Measurement between Wall-Mount SlotsConfiguring the Wireless-G Router for Mobile Broadband Password ScreenInternet Setup Setup Tab Basic SetupMobile Network Setup StatusStatic IP Connection Type Optional Settings L2TP Connection TypeNetwork Setup Network Address Server Settings DhcpRouter IP Time Setting 11 Time SettingMobile Network Status Setup Tab Mobile NetworkMobile Network Connection Mode Data Card StatusSetup Tab Ddns DynDNS.orgTZO.com Setup Tab MAC Address Clone MAC CloneDynamic Routing Setup Tab Advanced RoutingAdvanced Routing Static RoutingWireless Tab Basic Wireless Settings Wireless NetworkWireless Tab Wireless Security Wireless SecurityAES 25 Wireless Tab Wireless Security Radius Wireless Tab Wireless MAC Filter Wireless MAC FilterWireless Tab Advanced Wireless Settings Advanced WirelessWireless-G Router for Mobile Broadband Security Tab Firewall FirewallBlock WAN Requests To create an Internet Access policy Access Restrictions Tab Internet AccessInternet Access Security Tab VPN Passthrough33 Internet Policy Summary Applications and Gaming Tab Port Range Forward Port Range ForwardTriggered Range Applications & Gaming Tab Port TriggeringPort Triggering Forwarded RangeApplications and Gaming Tab QoS Wired QoSApplications and Gaming Tab DMZ Device PriorityWireless QoS Ethernet Port PriorityApplication Priority Administration Tab Management Router PasswordUPnP Administration Tab Log LogAdministration Tab Diagnostics Ping TestTraceroute Test Administration Tab Factory Defaults Administration Tab Firmware UpgradeAdministration Tab Config Management Status Tab Mobile Network 48 Status Tab Mobile NetworkStatus Tab Router Router InformationInternet Status Tab Local Network Local NetworkStatus Tab Wireless WirelessAppendix a Troubleshooting Common Problems and SolutionsNeed to set a static IP address on a PC Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Application Start and End Protocol IP Address Enabled TCPCan’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to upgrade the firmwareMy DSL service’s PPPoE is always disconnecting Power LED keeps flashing Is IPSec Pass-Through supported by the Router? Frequently Asked QuestionsWhere is the Router installed on the network? Does the Router support IPX or AppleTalk?If all else fails in the installation, what can I do? How will I be notified of new Router firmware upgrades?How can I avoid corrupted FTP downloads? Will the Router function in a Macintosh environment? What is DMZ Hosting?What are the advanced features of the Router? Is the Router cross-platform compatible?What Ieee 802.11g features are supported? What is the Ieee 802.11g standard?What is the Ieee 802.11b standard? What Ieee 802.11b features are supported?What is ISM band? What is infrastructure mode?What is roaming? What is Spread Spectrum?What is a MAC Address? What is DSSS? What is FHSS? And what are their differences?What is WEP? How do I reset the Router?What do the indicator LEDs signify on the Router? How do I connect to the mobile network?How do I know which mobile network I am using? Whom should I call if there is a question or problem?Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Router for Mobile Broadband Figure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Windows 2000 or XP Instructions For the Router’s Web-based UtilityFigure E-4 MAC Address Filter List Appendix F Glossary Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Appendix G Specifications FCC, IC-03, CE, Wi-Fi 802.11b, 802.11g, WPA Appendix H Warranty Information Appendix I Regulatory Information Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband