Security > vpn, Advanced configuration, Vpn passthrough – Linksys BEFSX41 User Manual

Page 12: Vpn tunnel

Advertising
background image

Chapter 2

Advanced Configuration

9

Broadband Firewall Router with 4-Port Switch/VPN Endpoint

computers. Select Enabled to filter multicasting. This

feature is disabled by default.

Filter Internet NAT Redirection

This feature uses port

forwarding to block access to local servers from local

networked computers. Select Enabled to filter Internet

NAT redirection. This feature is disabled by default.
Click Save Settings to apply your changes, or click Cancel

Changes to cancel your changes.

Security > VPN

The VPN screen allows you to enable VPN tunnels.

Security > VPN

VPN Passthrough

IPSec Passthrough

Internet Protocol Security (IPSec) is

a suite of protocols used to implement secure exchange

of packets at the IP layer. To allow IPSec tunnels to pass

through the Router, keep the default, Enabled.

PPPoE Passthrough

Point-to-Point over Ethernet

(PPPoE) Passthrough allows your computer(s) to use the

PPPoE client software provided by your ISP. Some ISPs

may request that you use this feature on the Router. To

allow PPPoE Passthrough, keep the default, Enabled.

PPTP Passthrough

Point-to-Point Tunneling Protocol

(PPTP) allows the Point-to-Point Protocol (PPP) to be

tunneled through an IP network. To allow PPTP tunnels to

pass through the Router, keep the default, Enabled.
Click Save Settings to apply your changes, or click Cancel

Changes to cancel your changes.

VPN Tunnel

Security > VPN Tunnel

Establishing a Tunnel

The Router creates a tunnel or channel between two

endpoints, so that the data or information between these

endpoints is secure. To establish this tunnel, select the

tunnel you wish to create in the Select Tunnel Entry drop-

down box. It is possible to create up to two simultaneous

tunnels. To delete a tunnel, click the Delete button. To view

a summary of that tunnel, click the Summary button.
Then check the box next to Enable to enable the tunnel.
Once the tunnel is enabled, enter the name of the tunnel

in the Tunnel Name field. This is to allow you to identify

multiple tunnels and does not have to match the name

used at the other end of the tunnel.

Local Secure Group and Remote Secure Group

A Local Secure Group is a computer(s) on your network

that can access the tunnel. A Remote Secure Group is a

computer(s) on the remote end of the tunnel that can

access the tunnel. Under Local Secure Group and Remote

Secure Group, you may choose one of three options:

Subnet, IP Address, and IP Range. Under Remote Secure

Group, you have two additional options: Host and Any.

Subnet

If you select Subnet (which is also the default),

this will allow all computers on the local subnet to access

the tunnel. When using the Subnet setting, the default

values of 0 should remain in the last fields of the IP and

Mask settings.

Advertising