User Manual
Table Of Contents
- Chapter 1: Planning Your Network
- Chapter 2: Getting to Know the Wireless-G ADSL Gateway with 2 Phone Ports
- Chapter 3: Connecting the Wireless-G ADSL Gateway
- Chapter 4: Configuring the Gateway
- Chapter 5: Using the Linksys Parental Control Service
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
- Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
- Appendix E: Upgrading Firmware
- Appendix F: Windows Help
- Appendix G: Glossary
- Appendix H: Specifications
- Appendix I: Warranty Information
- Appendix J: Regulatory Information
- Appendix K: Contact Information
34
Chapter 4: Configuring the Gateway
The Security Tab
Wireless-G ADSL Gateway with 2 Phone Ports
VPN
Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two
remote locations. The VPN screen allow s you to configure your VPN settings to make your network more secure.
VPN Passthrough
IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the Enable button. To disable IPSec Passthrough,
click the Disable button.
PPPoE Passthrough. The PPPoE (Point-to-Point Protocol over Ethernet) option is included for those users who
wish to disable PPPoE sessions. This option is enabled by default. To disable PPPoE Passthrough, click the
Disable button.
PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to
a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enable button. To disable PPTP
Passthrough, click the Disable button.
L2TP Passthrough. Layering 2 Tunneling Protocol Passthrough is an extension of the Point-to-Point Tunneling
Protocol (PPTP) used to enable the operation of a VPN over the Internet.To allow L2TP Passthrough, click the
Enable button. To disable L2TP Passthrough, click the Disable button.
IPSec VPN Tunnel
The VPN Gateway creates a tunnel or channel between two endpoints, so that the data or information between
these endpoints is secure.
To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is
possible to create up to five simultaneous tunnels. Then click Enabled to enable the IPSec VPN tunnel. Once the
tunnel is enabled, enter the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple
tunnels and does not have to match the name used at the other end of the tunnel. To delete a tunnel entry, select
the tunnel, then click Delete. To view a summary of the settings, click Summary.
Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your network
that can access the tunnel. The Remote Secure Group is the computer(s) on the remote end of the tunnel that can
access the tunnel. These computers can be specified by a Subnet, specific IP address, or range.
Local Security Gateway. This pull-down menu w ill provide you w ith your available Internet connection options.
Figure 4-24: Security Tab - VPN
Figure 4-25: VPN Settings Summary