Virtual Private Networks (VPNs)
■You must specify a Key String of up to (and including) 20 characters when DES is selected. When encryption is None, this field is invisible.
■You can specify that this router will Initiate Connections, acting as a foreign agent (Yes), or only answer them, acting as a home agent (No).
■Tunnels are normally initiated On Demand; however, you can disable this feature. When disabled, the tunnel must be manually established through the call management screens.
■You can specify the Idle Timeout, an inactivity timer, whose expiration will terminate the tunnel. A value of zero disables the timer. Because tunnels are subject to abrupt termination when the underlying datalink is torn down, use of the Idle Timeout is strongly encouraged.
■Return to the Connection Profile screen by pressing Escape.
■Select IP Profile Parameters and press Return. The IP Profile Parameters screen appears.
IP Profile Parameters
Address Translation Enabled: | Yes |
NAT Map List... | |
NAT Server List... | |
Local WAN IP Address: | 0.0.0.0 |
Remote IP Address: | 173.167.8.10 |
Remote IP Mask: | 255.255.0.0 |
Filter Set... |
|
Remove Filter Set |
|
Receive RIP: | Both |
Enter a subnet mask in decimal and dot form (xxx.xxx.xxx.xxx).
■Enter the Remote IP Address and Remote IP Mask for the host to which you want to tunnel.
Allowing VPNs through a Firewall
An administrator interested in securing a network will usually combine the use of VPNs with the use of a firewall or some similar mechanism. This is because a VPN is not a complete security solution, but rather a component of overall security. Using a VPN will add security to transactions carried over a public network, but a VPN alone will not prevent a public network from infiltrating a private network. Therefore, you should combine use of a firewall with VPNs, where the firewall will secure the private network from infiltration from a public network, and the VPN will secure the transactions that must cross the public network.