Cisco WAG54G User Manual - Page 36

Local Secure Group and Remote Secure Group. The Local Secure Group is the computers on your LAN - vpn passthrough

Page 36 highlights

Wireless-G ADSL Gateway VPN Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. The VPN screen allows you to configure your VPN settings to make your network more secure. VPN Passthrough • IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enable button. To disable IPSec Passthrough, click the Disable button. • PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enable button. To disable PPTP Passthrough, click the Disable button. • L2TP Passthrough. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling Protocol (PPTP) used to enable the operation of a VPN over the Internet.To allow L2TP Passthrough, click the Enable button. To disable L2TP Passthrough, click the Disable button. IPSec VPN Tunnel The VPN Gateway creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is secure. • To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is possible to create up to five simultaneous tunnels. Then click Enabled to enable the IPSec VPN tunnel. Once the tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. To delete a tunnel entry, select the tunnel, then click Delete. To view a summary of the settings, click Summary. • Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that can access the tunnel. The Remote Secure Group is the computer(s) on the remote end of the tunnel that can access the tunnel. These computers can be specified by a Subnet, specific IP address, or range. • Local Security Gateway. • Remote Security Gateway. The Remote Security Gateway is the VPN device, such as a second VPN Gateway, on the remote end of the VPN tunnel. Enter the IP Address or Domain of the VPN device at the other end of the tunnel. The remote VPN device can be another VPN Gateway, a VPN Server, or a computer with VPN client software that supports IPSec. The IP Address may either be static (permanent) or dynamic (changing), depending on the settings of the remote VPN device. Make sure that you have entered the IP Address Chapter 5: Configuring the Gateway The Security Tab Figure 5-22: VPN Figure 5-23: VPN Settings Summary 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99

29
Chapter 5: Configuring the Gateway
The Security Tab
Wireless-G ADSL Gateway
VPN
Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two
remote locations. The VPN screen allows you to configure your VPN settings to make your network more secure.
VPN Passthrough
IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec Passthrough, click the
Enable
button. To disable IPSec
Passthrough, click the
Disable
button.
PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions
to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the
Enable
button. To disable PPTP
Passthrough, click the
Disable
button.
L2TP Passthrough. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling
Protocol (PPTP) used to enable the operation of a VPN over the Internet.To allow L2TP Passthrough, click the
Enable
button. To disable L2TP Passthrough, click the
Disable
button.
IPSec VPN Tunnel
The VPN Gateway creates a tunnel or channel between two endpoints, so that the data or information between
these endpoints is secure.
To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box.
It is
possible to create up to five simultaneous tunnels. Then click
Enabled
to enable the IPSec VPN tunnel. Once
the tunnel is enabled, enter the name of the tunnel in the Tunnel Name field.
This is to allow you to identify
multiple tunnels and does not have to match the name used at the other end of the tunnel. To delete a tunnel
entry, select the tunnel, then click
Delete
. To view a summary of the settings, click
Summary
.
Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that
can access the tunnel. The Remote Secure Group is the computer(s) on the remote end of the tunnel that can
access the tunnel. These computers can be specified by a Subnet, specific IP address, or range.
Local Security Gateway.
Remote Security Gateway. The Remote Security Gateway is the VPN device, such as a second VPN Gateway,
on the remote end of the VPN tunnel. Enter the IP Address or Domain of the VPN device at the other end of the
tunnel. The remote VPN device can be another VPN Gateway, a VPN Server, or a computer with VPN client
software that supports IPSec. The IP Address may either be static (permanent) or dynamic (changing),
depending on the settings of the remote VPN device.
Make sure that you have entered the IP Address
Figure 5-22: VPN
Figure 5-23: VPN Settings Summary