Linksys BEFVP41 User Manual page 15

Instant broadband series etherfast cable/dsl vpn router with 4-port 10/100 switch
Hide thumbs Also See for BEFVP41:
Table of Contents

Advertisement

• IP Address - If you select IP Address, only the computer with the spe-
cific IP Address that you enter will be able to access the tunnel. In the
example shown in Figure 5-6, only the computer with IP Address
192.168.1.104 can access the tunnel from this end. Only the computer
with IP Address 192.168.2.58 can access the tunnel from the remote end.
• IP Range - If you select IP Range, it will be a sort of combination of
Subnet and IP Address. You can specify a range of IP Addresses on the
Subnet which will have access to the tunnel. In the example shown in
Figure 5-7, all computers on this end of the tunnel with IP Addresses
between 192.168.1.2 and 192.168.1.200 can access the tunnel from the
local end. Only computers assigned an IP Address between 192.168.2.2
and 192.168.2.135 can access the tunnel from the remote end.
Under Remote Security Gateway, enter the IP Address of the VPN device at the
other end of the tunnel. The remote VPN device can be another VPN Router, a
VPN Server, or a host with VPN software. In the example shown in Figure 5-7,
the IP Address of the Remote Security Gateway is 140.111.1.2. This IP Address
may either be static (permanent) or dynamic (changing), depending on the set-
tings of the remote VPN device. Make sure that you have entered the IP Address
correctly, or the connection cannot be made. Remember, this is NOT the IP
Address of this VPN Router, but the IP Address of the remote VPN device with
which you wish to communicate.
23
Instant Broadband™ Series
Figure 6-6
Figure 6-7
EtherFast
Cable/DSL VPN Router with 4-Port 10/100 Switch
®
Figure 6-8
Using Encryption also helps make your connection more secure. There are
two different types of encryption: DES or 3DES. You may choose either of
these, but it must be the same type of encryption that is being used by the
VPN device at the other end of the tunnel. Or, you may choose not to
encrypt by selecting Disable. In our example shown in Figure 5-8, DES
(which is the default) has been selected.
Authentication acts as another level of security. There are two types of
authentication: MD5 and SHA. As with encryption, either of these may be
selected, provided that the VPN device at the other end of the tunnel is using
the same type of authentication. Or, both ends of the tunnel may choose to
Disable authentication. In Figure 5-8, MD5 (the default) has been selected.
24

Advertisement

Table of Contents
loading

Table of Contents