The Security Tab - Vpn; Figure 6-21: Security Tab - Vpn; Figure 6-22: Local Secure Group - Subnet And Remote Secure Group - Subnet - Linksys WRV54G User Manual

2.4ghz wireless-g vpn broadband router
Hide thumbs Also See for WRV54G:
Table of Contents

Advertisement

Wireless-G VPN Broadband Router

The Security Tab - VPN

Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two
remote locations. This connection is very specific as far as its settings are concerned; this is what creates the
security. The VPN screen allows you to configure your VPN settings to make your network more secure.
VPN PassThrough
IPSec Passthrough. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the Enabled button. To disable IPSec Passthrough,
click the Disabled button.
PPTP Pass Through. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be
tunneled through an IP network. To allow PPTP Passthrough, click the Enabled button. To disable PPTP
Passthrough, click the Disabled button.
L2TP Passthrough. Layer 2 Tunneling Protocol Passthrough is the method used to enable Point-to-Point
sessions via the Internet on the Layer 2 level. To allow L2TP Passthrough, click the Enabled button. To disable
L2TP Passthrough, click the Disabled button.
VPN Tunnel
The VPN Broadband Router creates a tunnel or channel between two endpoints, so that the data or information
between these endpoints is secure.
Select Tunnel Entry. To establish this tunnel, select the tunnel you wish to create from the drop-down box. It is
possible to create up to 100 simultaneous tunnels.

Figure 6-21: Security Tab - VPN

VPN Tunnel. Click Enabled to enable the selected VPN Tunnel.
VPN Gateway. If you want to route all the traffic through the tunnel, and not just the ones destined for the remote
secure group, click Enabled.
Tunnel Name. Once the tunnel is enabled, enter the name of the tunnel. This allows you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel.
Local Secure Group
The Local Secure Group is the computer(s) on your LAN that can access the tunnel. From the drop-down menu,
Figure 6-22: Local Secure Group - Subnet
select Subnet, to include the entire network for the tunnel; select IP Address if you want a specific computer; IP
and Remote Secure Group - Subnet
Range, if you want to include a range of IP addresses; or select Host, which is used with Port Forwarding to
Chapter 6: Configuring the Wireless-G VPN Broadband Router
31
The Security Tab - VPN

Advertisement

Table of Contents
loading

Table of Contents