D-Link DWC-1000 DWC-1000 User's Guide - Page 92

VPN Settings

Page 92 highlights

6. VPN SETTINGS A Virtual Private Network (VPN) is a technology designed to increase the security of information transferred over the Internet. A VPN creates a private encrypted tunnel from the user's computer, through the local wireless network and Internet, all the way to the remote endpoint, such as corporate servers and databases. The wireless controller uses the Internet Protocol Security (IPSec) to secure IP traffic. IPSec builds "virtual tunnels" between a local and remote subnet for secure communication between two networks. This connection is commonly known as a Virtual Private Network (VPN). Alternatively, tunneling protocols such as L2TP and PPTP can be used to achieve a secure connection (such as to a corporate LAN) over the Internet. These tunneling protocols can optionally be secured themselves using IPSec. The wireless controller supports a number of features for securing your network. This chapter describes the most commonly used VPN features: • Configuring VPN Clients (page 93) • Configuring IPsec Policies (page 95) • Mode Config Settings (page 109) • DHCP Range (page 112) • PPTP/LT2P Tunnels (page 113) For information about additional VPN settings not described in this chapter, see "Additional VPN Settings" on page 123. Note: The procedures in this chapter should only be performed by expert users who understand networking concepts and terminology. 92 DWC-1000 Wireless Controller User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

92
DWC-1000 Wireless Controller User’s Guide
6.
VPN SETTINGS
A Virtual Private Network (VPN) is a technology designed to increase the security of
information transferred over the Internet. A VPN creates a private encrypted tunnel from the
user's computer, through the local wireless network and Internet, all the way to the remote
endpoint, such as corporate servers and databases.
The wireless controller uses the Internet Protocol Security (IPSec) to secure IP traffic. IPSec
builds “virtual tunnels” between a local and remote subnet for secure communication
between two networks. This connection is commonly known as a Virtual Private Network
(VPN).
Alternatively, tunneling protocols such as L2TP and PPTP can be used to achieve a secure
connection (such as to a corporate LAN) over the Internet. These tunneling protocols can
optionally be secured themselves using IPSec. The wireless controller supports a number of
features for securing your network.
This chapter describes the most commonly used VPN features:
Configuring VPN Clients (page 93)
Configuring IPsec Policies (page 95)
Mode Config Settings (page 109)
DHCP Range (page 112)
PPTP/LT2P Tunnels (page 113)
For information about additional VPN settings not described in this chapter, see “Additional
VPN Settings” on page 123.
Note:
The procedures in this chapter should only be performed by expert users who
understand networking concepts and terminology.