Linksys WRT310N User Guide - Page 20

Access Restrictions > Internet Access, VPN Passthrough, Internet Access Policy - access point

Page 20 highlights

Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled. L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Access Restrictions > Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be managed by a policy. Use the settings on this screen to establish an access policy (after Save Settings is clicked). Selecting a policy from the dropdown menu will display that policy's settings. To delete a policy, select that policy's number and click Delete This Policy. To view all the policies, click Summary. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). To enable a policy, select Enabled. To delete a policy, click Delete. Click Save Settings to save your changes, or click Cancel Changes to cancel your changes. To return to the Internet Access Policy screen, click Close. Wireless-N Gigabit Router Summary 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53

Chapter 3
Advanced Configuration
19
Wireless-N Gigabit Router
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.
Access Restrictions > Internet Access
Internet Access Policy
Access Policy
Access can be managed by a policy. Use the
settings on this screen to establish an access policy (after
Save Settings
is clicked). Selecting a policy from the drop-
down menu will display that policy’s settings. To delete a
policy, select that policy’s number and click
Delete This
Policy
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Access, Days, Time, and status (Enabled). To
enable a policy, select
Enabled
. To delete a policy, click
Delete
. Click
Save Settings
to save your changes, or click
Cancel Changes
to cancel your changes. To return to the
Internet Access Policy
screen, click
Close
.
Summary