D-Link DWC-1000-WCF-LIC User Guide - Page 95

Vpn Settings

Page 95 highlights

6. VPN SETTINGS A Virtual Private Network (VPN) is a technology designed to increase the security of information transferred over the Internet. A VPN creates a private encrypted tunnel from the user's computer, through the local wireless network and Internet, all the way to the remote endpoint, such as corporate servers and databases. The wireless controller uses the Internet Protocol Security (IPSec) to secure IP traffic. IPSec builds ―virtual tunnels‖ between a local and remote subnet for secure communication between two networks. This connection is commonly known as a Virtual Private Network (VPN). Alternatively, tunneling protocols such as L2TP and PPTP can be used to achieve a secure connection (such as to a corporate LAN) over the Internet. These tunneling protocols can optionally be secured themselves using IPSec. The wireless controller supports a number of features for securing your network. This chapter describes the most commonly used VPN features:  Configuring VPN Clients (page 96)  Configuring IPsec Policies (page 98)  Mode Config Settings (page 112)  DHCP Range (page 115)  PPTP/LT2P Tunnels (page 116) For information about additional VPN settings not described in this chapter, see ―Additional VPN Settings‖ on page 126. Note: The procedures in this chapter should only be performed by expert users who understand networking concepts and terminology. 95 DWC-1000 Wireless Controller User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

95
DWC-1000 Wireless Controller
User’s
Guide
6.
VPN SETTINGS
A Virtual Private Network (VPN) is a technology designed to increase the security of
information transferred over the Internet. A VPN creates a private encrypted tunnel from the
user's computer, through the local wireless network and Internet, all the way to the remote
endpoint, such as corporate servers and databases.
The wireless controller uses the Internet Protocol Security (IPSec) to secure IP traffic. IPSec
builds ―virtual tunnels‖ between a local and remote subnet for secure communic
ation
between two networks. This connection is commonly known as a Virtual Private Network
(VPN).
Alternatively, tunneling protocols such as L2TP and PPTP can be used to achieve a secure
connection (such as to a corporate LAN) over the Internet. These tunneling protocols can
optionally be secured themselves using IPSec. The wireless controller supports a number of
features for securing your network.
This chapter describes the most commonly used VPN features:
Configuring VPN Clients (page 96)
Configuring IPsec Policies (page 98)
Mode Config Settings (page 112)
DHCP Range (page 115)
PPTP/LT2P Tunnels (page 116)
For information about additional VPN
settings not described in this chapter, see ―
Additional
VPN Settings
‖ on page
126.
Note:
The procedures in this chapter should only be performed by expert users who
understand networking concepts and terminology.