Virtual Private Networking (Vpn); Creating A Virtual Private Network - TRENDnet TW100-BRV214 User Manual

4-port vpn router
Hide thumbs Also See for TW100-BRV214:
Table of Contents

Advertisement

TRENDnet User's Guide

Virtual Private Networking (VPN)

Creating a Virtual Private Network

What is a VPN?
A VPN provides secure communications typically over the Internet by creating a secure
tunnel between two or more VPN routers (gateways) also known as a site-to-site VPN or
between a single client computer and a VPN router (gateway) also known as a client-
server VPN.
On your VPN router, the following types of tunnels can be created:
Site-to-Site VPN – Connects two or more VPN routers (gateways) allowing the
LAN network from each router to securely communicate to each other over the
Internet.
Client-Server VPN – A single client computer or device with VPN client software
installed connects to a VPN router (gateway) allow the single client computer
or device to securely communicate to the LAN network of the VPN router over
the Internet.
© Copyright 2012 TRENDnet. All Rights Reserved.
Tunneling methods supported by your router:
IPsec (Internet Protocol Security) VPN – This type of VPN can be used for
either Site-to-Site VPN or Client-Server VPN however, the most common
application for this type is a Site-to-Site VPN. This type of VPN can provide
highest degree of security. For a Client-Server VPN, typically, a third party VPN
client software is required to be installed and configured and can be difficult
when installing and configuring on VPN client computers. This VPN type can
provide the highest degree of security.
PPTP (Point-to-Point Tunneling Protocol) VPN – This type of VPN can be used
for Client-Server VPN only however both server mode and client mode are
supported on your router. Most computer operating systems already include a
pre-installed PPTP VPN client software that can be easily configured which
eliminates the need for an additional third party VPN client software to be
purchased and installed. Since it provides less security overall than IPsec VPN, it
is not recommended for a Site-to-Site VPN.
L2TP (Layer 2 Tunneling Protocol) VPN – This type of VPN is very similar to
PPTP VPN as it is most commonly used for a Client-Server VPN, pre-installed on
most computer operating systems and easy to configure, and provides less
overall security than IPsec VPN. Most of the current operating systems with
L2TP VPN client software pre-installed use L2TP VPN in conjunction with IPsec
VPN to improve the overall security provided. This router does not support the
L2TP over IPsec VPN method.
GRE (Generic Routing Encapsulation) Tunneling – This is strictly a tunneling
protocol as it does not provide any security mechanisms and it can only be
used for Site-to-Site tunneling to another router with GRE tunneling support
but in most current implementations can be used in conjunction with IPsec or
PPTP/L2TP to add security mechanisms. Because of the nature of how GRE
works, the benefits include allow multicast traffic and allowing dynamic routing
protocols to pass through the tunnel compared to IPsec VPN. This router does
not support GRE over IPsec VPN or GRE over PPTP/L2TPVPN methods.
Important Note: For any tunneling or VPN method used, to avoid IP address conflict and
to ensure connectivity, it is required that each end (LAN IP network or single client) of the
VPN tunnel is configured with a different IP network or subnet.
TW100-BRV214
12

Advertisement

Table of Contents
loading

Table of Contents