Vpn - Linksys BEFVP41 User Manual

Instant broadband series etherfast cable/dsl vpn router with 4-port 10/100 switch
Hide thumbs Also See for BEFVP41:
Table of Contents

Advertisement

PPTP
Point
to
Point
Tunneling Protocol
(PPTP) is a service
that applies for con-
nections in Europe
only. (This setup is
shown in Figure 6-7.)
Specify
WAN IP
Address This is the
Router's IP address,
as seen from the
Internet. Your ISP
will provide you with
the IP Address you
need to specify here.
Subnet Mask This is the Router's Subnet Mask, as seen by external users on
the Internet (including your ISP). Your ISP will provide you with the Subnet
Mask.
Default Gateway Address Your ISP will provide you with the Default Gateway
Address.
Connect on Demand and Max Idle Time You can configure the Router to cut
your connection with your ISP after a specified period of time (Max Idle
Time). If you have been disconnected due to inactivity, Connect on Demand
enables the Router to automatically re-establish your connection as soon as you
attempt to access the Internet again. If you wish to activate Connect on
Demand, click the radio button. If you want your Internet connection to remain
on at all times, enter 0 in the Max Idle Time field. Otherwise, enter the num-
ber of minutes you want to have elapsed before your Internet access discon-
nects.
Keep Alive Option and Redial Period This option keeps your PPPoE-enabled
Internet access connected indefinitely, even when it sits idle. Click the radio
button next to Keep Alive to select it. The default Redial Period is 30 seconds.
24
Instant Broadband
Series
®
Figure 6-7
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch

VPN

Figure 6-8
Virtual Private Networking (VPN) is a security measure that basically creates
a secure connection between two remote locations. This connection is very
specific as far as its settings are concerned; this is what creates the security.
The VPN screen, shown in Figure 6-8, allows you to configure your VPN set-
tings to make your network more secure.
Note: Network security, while a desirable and often necessary
aspect of networking, is complex and requires a thorough under-
standing of networking principles.
25

Advertisement

Table of Contents
loading

Table of Contents