The Security Tab - Vpn Passthrough; The Access Restrictions Tab - Internet Access Policy; Figure 5-23: Security Tab - Vpn Passthrough; Figure 5-24: Access Restrictions Tab - Internet Access Policy - Cisco Linksys WRT54GCV2 User Manual

Wireless-g
Table of Contents

Advertisement

Compact Wireless-G Broadband Router

The Security Tab - VPN Passthrough

Use the settings on this tab to allow VPN tunnels using IPSec, L2TP, or PPTP protocols to pass through the
Router's firewall.
VPN Passthrough
IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. IPSec Pass-Through is enabled by default. To disable IPSec Passthrough, select
Disabled.
L2TP Passthrough. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. L2TP Pass-Through is enabled by default. To disable L2TP Passthrough, select
Disabled.
PPTP Passthrough. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Pass-Through is enabled by default. To disable PPTP Passthrough, select
Disabled.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes. Help information is shown on the right-hand side of the screen.

The Access Restrictions Tab - Internet Access Policy

The Internet Access Policy screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated applications, websites, and inbound traffic during specific days and times.
Internet Access Policy
Access Policy. Access can be managed by a policy. Use the settings on this screen to establish an access policy
(after the Save Settings button is clicked). Selecting a policy from the drop-down menu will display that policy's
settings. To delete a policy, select that policy's number and click the Delete This Policy button. To view all the
policies, click the Summary button.
On the Summary screen, the policies are listed with the following information: No., Policy Name, Access, Days,
Time, and status (Enabled). You can change the type of access, days, and times of a policy. To activate a policy,
click the Enabled checkbox. To delete a policy, click its Delete button. Click the Save Settings button to save
your changes, or click the Cancel Changes button to cancel your changes. To return to the Internet Access Policy
tab, click the Close button. To view the list of PCs for a specific policy, click the PCs List button.
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Security Tab - VPN Passthrough

Figure 5-23: Security Tab - VPN Passthrough

ipsec: a VPN protocol used to implement
secure exchange of packets at the IP layer.
pptp: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe.
Figure 5-24: Access Restrictions Tab - Internet
Access Policy
28

Advertisement

Table of Contents
loading

Table of Contents