Linksys 2.4 GHz 802.11g Wireless-G ADSL Gateway with 2 Ports WAG54GP2 User Manual

Page 43

Advertising
background image

34

Chapter 4: Configuring the Gateway
The Security Tab

Wireless-G ADSL Gateway with 2 Phone Ports

VPN

Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two
remote locations. The VPN screen allows you to configure your VPN settings to make your network more secure.

VPN Passthrough

IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the Enable button. To disable IPSec Passthrough,
click the Disable button.

PPPoE Passthrough. The PPPoE (Point-to-Point Protocol over Ethernet) option is included for those users who
wish to disable PPPoE sessions. This option is enabled by default. To disable PPPoE Passthrough, click the
Disable button.

PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to
a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enable button. To disable PPTP
Passthrough, click the Disable button.

L2TP Passthrough. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling
Protocol (PPTP) used to enable the operation of a VPN over the Internet.To allow L2TP Passthrough, click the
Enable button. To disable L2TP Passthrough, click the Disable button.

IPSec VPN Tunnel

The VPN Gateway creates a tunnel or channel between two endpoints, so that the data or information between
these endpoints is secure.

To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is
possible to create up to five simultaneous tunnels. Then click Enabled to enable the IPSec VPN tunnel. Once the
tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel. To delete a tunnel entry, select
the tunnel, then click Delete. To view a summary of the settings, click Summary.

Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your network
that can access the tunnel. The Remote Secure Group is the computer(s) on the remote end of the tunnel that can
access the tunnel. These computers can be specified by a Subnet, specific IP address, or range.

Local Security Gateway. This pull-down menu will provide you with your available Internet connection options.

Figure 4-24: Security Tab - VPN

Figure 4-25: VPN Settings Summary

Advertising