Wireless-G VPN Broadband Router
VPN
Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen, shown in Figure
VPN PassThrough
•IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enabled button. To disable IPSec Passthrough, click the Disabled button.
•PPTP Pass Through.
•L2TP Pass Through. Layering 2 Tunneling Protocol Passthrough is an extension of the
VPN Tunnel
The VPN Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is secure.
•To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry
•Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that can access the tunnel. The Remote Secure Group is the computer (s) on the remote end of the tunnel that can access the tunnel. Enter the IP Address and Subnet Mask of the local VPN Router in the fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0).
•Remote Security Gateway. The Remote Security Gateway is the VPN device, such as a second VPN Router, on the remote end of the VPN tunnel. Enter the IP Address of the VPN device at the other end of the tunnel. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The IP Address may either be static (permanent) or dynamic (changing), depending on the
Chapter 6: Configuring the Router
Figure 6-17: VPN
31
The Security Tab