Security > Vpn Passthrough; Access Restrictions; Access Restrictions > Internet Access - Cisco WRP500 Administration Manual

Wireless-g broadband router with 2 phone ports and built-in analog telephone adapter
Hide thumbs Also See for WRP500:
Table of Contents

Advertisement

Access Restrictions

R E V I E W D R A F T # 1 — C I S C O C O N F I D E N T I A L
Security > VPN Passthrough
IPSec Passthrough
PPTP
L2TP Passthrough
Access Restrictions
The Access Restrictions module includes the following pages:
Access Restrictions > Internet Access
Enter Policy Name
Status
Applied PCs
Cisco WRP500 Administration Guide
B-18
Internet Protocol Security (IPSec) is a suite of
protocols used to implement secure exchange of
packets at the IP layer. When this feature is enabled,
IPSec tunnels are allowed to pass through the WRP500.
Default: Enabled
Passthrough Point-to-Point Tunneling Protocol (PPTP)
allows the Point-to-Point Protocol (PPP) to be tunneled
through an IP network. When this feature is enabled,
PPTP tunnels are allowed to pass through the WRP500.
Default: Enabled
Layer 2 Tunneling Protocol is the method used to
enable Point-to-Point sessions via the Internet on the
Layer 2 level. When this feature is enabled, L2TP
tunnels are allowed to pass through the WRP500.
Default: Enabled
"Access Restrictions > Internet Access" on page 18
A name for the policy
Policies are disabled by default. To enable the selected
policy, select Enabled.
The computers that will be affected by the policy that
you selected in the Access Policy list.
MAC Address: The MAC address of the device.
IP Address: The final octet of the IP address.
IP Address Range: A range of devices, identfied by
the final octet of the starting IP address and the
final octect of the ending IP address.
Appendix B
Data Fields

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents