Figure 6-16: Security Tab - Vpn; Figure 6-17: Local And Remote Secure Group - Cisco Linksys BEFVP41 v2 User Manual

Cable/dsl vpn router with 4-port 10/100 switch
Table of Contents

Advertisement

EtherFast Cable/DSL VPN Router with 4-Port 10/100 Switch
PPTP Pass Through. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN
sessions to a Windows 2000 server. To allow PPTP Passthrough, click the Enabled button. To disable PPTP
Passthrough, click the Disabled button.
When finished making your changes on this screen, click the Save Settings button to save these changes, or
click the Cancel Changes button to undo your changes.
VPN Tunnel
Establishing a Tunnel
The Router creates a tunnel or channel between two endpoints, so that the data or information between
these endpoints is secure. To establish this tunnel, select the tunnel you wish to create in the Select Tunnel
Entry drop-down box. It is possible to create up to 50 simultaneous tunnels. To delete a tunnel, click the
Delete button. To view a summary of that tunnel, click the Summary button.
Then check the box next to Enable to enable the tunnel.
Once the tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to
identify multiple tunnels and does not have to match the name used at the other end of the tunnel.
Local Secure Group and Remote Secure Group
A Local Secure Group is a computer(s) on your network that can access the tunnel. A Remote Secure Group is a
computer (s) on the remote end of the tunnel that can access the tunnel. Under Local Secure Group and Remote
Secure Group, you may choose one of three options: Subnet, IP Address, and IP Range. Under Remote Secure
Group, you have two additional options: Host and Any.
Subnet. If you select Subnet (which is also the default), this will allow all computers on the local subnet to
access the tunnel. When using the Subnet setting, the default values of 0 should remain in the last fields of
the IP and Mask settings.
IP Address. If you select IP Address, only the computer with the specific IP Address that you enter will be
able to access the tunnel.
IP Range. If you select IP Range, it will be a combination of Subnet and IP Address. You can specify a range
of IP Addresses within the Subnet which will have access to the tunnel.
The next to options are for Remote Secure Groups only.
Host. If you select Host for the Remote Secure Group, then the Remote Secure Group will be the same as the
Remote Security Gateway setting: IP Address, FQDN (Fully Qualified Domain Name), or Any.
Chapter 6: Using The Router's Web-based Utility
The Security tab

Figure 6-16: Security tab - VPN

Figure 6-17: Local and Remote Secure Group

29

Advertisement

Table of Contents
loading

Table of Contents