The Security Tab - Vpn Passthrough; The Security Tab - Vpn; Figure 5-25: Security Tab - Vpn Passthrough; Figure 5-26: Security Tab - Vpn - Cisco Linksys WTR54GS User Manual

Wireless-g travel router with speedbooster
Table of Contents

Advertisement

Wireless-G Travel Router with SpeedBooster

The Security Tab - VPN Passthrough

Use the settings on this tab to allow VPN tunnels using IPSec, L2TP, or PPTP protocols to pass through the
Router's firewall.
VPN Passthrough
IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. IPSec Pass-Through is enabled by default. To disable IPSec Passthrough, select
Disabled.
L2TP Passthrough. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. L2TP Pass-Through is enabled by default. To disable L2TP Passthrough, select
Disabled.
PPTP Passthrough. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Pass-Through is enabled by default. To disable PPTP Passthrough, select
Disabled.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes. Help information is shown on the right-hand side of the screen.

The Security Tab - VPN

Use the settings on this tab to create VPN tunnels. The Wireless-G Travel Router creates a tunnel or channel
between two endpoints, so that the data or information between these endpoints is secure.
VPN Tunnel
Establishing a Tunnel
The Router creates a tunnel or channel between two endpoints, so that the data or information between these
endpoints is secure. To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-
down menu. It is possible to create up to two simultaneous tunnels. To delete a tunnel, click the Delete button.
To view a summary of that tunnel, click the Summary button. The VPN Settings Summary screen displays the
number, name, local group, remote group, remote gateway, and security method.
Then check the box next to Enable to enable the tunnel. Once the tunnel is enabled, enter the name of the tunnel
in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name
used at the other end of the tunnel.
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Security Tab - VPN Passthrough

Figure 5-25: Security Tab - VPN Passthrough

ipsec: a VPN protocol used to implement
secure exchange of packets at the IP layer.
pptp: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe.

Figure 5-26: Security Tab - VPN

27

Advertisement

Table of Contents
loading

Table of Contents