Linksys WAG54GP2 manual VPN Passthrough, IPSec VPN Tunnel

Models: WAG54GP2

1 137
Download 137 pages 48.41 Kb
Page 43
Image 43

Wireless-G ADSL Gateway with 2 Phone Ports

VPN

Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. The VPN screen allows you to configure your VPN settings to make your network more secure.

VPN Passthrough

IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enable button. To disable IPSec Passthrough, click the Disable button.

PPPoE Passthrough. The PPPoE (Point-to-Point Protocol over Ethernet) option is included for those users who wish to disable PPPoE sessions. This option is enabled by default. To disable PPPoE Passthrough, click the Disable button.

PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enable button. To disable PPTP Passthrough, click the Disable button.

L2TP Passthrough. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling Protocol (PPTP) used to enable the operation of a VPN over the Internet.To allow L2TP Passthrough, click the Enable button. To disable L2TP Passthrough, click the Disable button.

IPSec VPN Tunnel

The VPN Gateway creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is secure.

To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is possible to create up to five simultaneous tunnels. Then click Enabled to enable the IPSec VPN tunnel. Once the tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. To delete a tunnel entry, select the tunnel, then click Delete. To view a summary of the settings, click Summary.

Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your network that can access the tunnel. The Remote Secure Group is the computer(s) on the remote end of the tunnel that can access the tunnel. These computers can be specified by a Subnet, specific IP address, or range.

Local Security Gateway. This pull-down menu will provide you with your available Internet connection options.

Chapter 4: Configuring the Gateway

Figure 4-24: Security Tab - VPN

Figure 4-25: VPN Settings Summary

34

The Security Tab

Page 43
Image 43
Linksys WAG54GP2 manual VPN Passthrough, IPSec VPN Tunnel