protocols – IPsec, PPTP, and L2TP. These protocols allow remote users to
establish a secure connection to another network. If your service provider
supports VPNs, then these protocols can be used to create an authenticated and
encrypted tunnel for passing secure data over the Internet (that is, a traditionally
shared data network).
IPsec (Internet Protocol Security) — Encrypts and authenticates entire IP packets
■
and encapsulates them into new IP packets for secure communications between
networks.
PPTP (Point-to-Point Tunneling Protocol) — Provides a secure tunnel for remote
■
client access to a PPTP security gateway. PPTP includes provisions for call
origination and flow control required by ISPs.
L2TP (Layer 2 Tunneling Protocol) — Merges the best features of PPTP and the
■
Layer 2 Forwarding (L2F) protocol. Like PPTP, L2TP requires that the ISP's routers
support the protocol.
H
D
ARDWARE
ESCRIPTION
The 150Mbps Wireless-N 3G Mobile Wireless Router, from herein
refered to as 3G Mobile Wireless Router, connects to the Internet through
its RJ-45 WAN port. It connects directly to your PC or to a local area network
using its RJ-45 Fast Ethernet LAN port.
The 3G Mobile Wireless Router includes an LED display on the front panel for system
power and port indications that simplifies installation and network troubleshooting.
5