Wireless-G VPN Broadband Router

The Security Tab - VPN

Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen allows you to configure your VPN settings to make your network more secure.

VPN PassThrough

IPSec Passthrough. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enabled button. To disable IPSec Passthrough, click the Disabled button.

PPTP Pass Through. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be tunneled through an IP network. To allow PPTP Passthrough, click the Enabled button. To disable PPTP Passthrough, click the Disabled button.

L2TP Passthrough. Layer 2 Tunneling Protocol Passthrough is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP Passthrough, click the Enabled button. To disable L2TP Passthrough, click the Disabled button.

VPN Tunnel

The VPN Broadband Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is secure.

Select Tunnel Entry. To establish this tunnel, select the tunnel you wish to create from the drop-down box. It is possible to create up to 100 simultaneous tunnels.

VPN Tunnel. Click Enabled to enable the selected VPN Tunnel.

VPN Gateway. If you want to route all the traffic through the tunnel, and not just the ones destined for the remote secure group, click Enabled.

Tunnel Name. Once the tunnel is enabled, enter the name of the tunnel. This allows you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel.

Local Secure Group

The Local Secure Group is the computer(s) on your LAN that can access the tunnel. From the drop-down menu, select Subnet, to include the entire network for the tunnel; select IP Address if you want a specific computer; IP Range, if you want to include a range of IP addresses; or select Host, which is used with Port Forwarding to

Chapter 6: Configuring the Wireless-G VPN Broadband Router

Figure 6-21: Security Tab - VPN

Figure 6-22: Local Secure Group - Subnet

and Remote Secure Group - Subnet

31

The Security Tab - VPN

Page 41
Image 41
Mitel WRV54G manual Security Tab VPN, VPN PassThrough, VPN Tunnel, Local Secure Group