INTRODUCTION

Virtual Private Network

The Wireless Barricade supports three of the most commonly used VPN protocols – PPTP, L2TP and IPSec. These protocols allow remote users to establish a secure connection to their corporate network. If your service provider supports VPNs, then any of these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet (i.e., a traditionally shared data network). The VPN protocols supported by the Wireless Barricade are briefly described below.

Point-to-Point Tunneling Protocol – Provides a secure tunnel for remote client access to a PPTP security gateway. PPTP includes provisions for call origination and flow control required by ISPs.

Layer Two Tunneling Protocol – Includes most of the features provided by PPTP, but has less overhead and is more suited for managed networks.

IP Security – Provides IP network-layer encryption. IPSec can support large encryption networks (such as the Internet) by using digital certificates for device authentication.

1-5

Page 19
Image 19
SMC Networks SMC7004AWBR manual Virtual Private Network