Linksys USBVPN1 User Manual page 24

Instant etherfastseries usb vpn & firewall adapter
Hide thumbs Also See for USBVPN1:
Table of Contents

Advertisement

Note: Network security is a desirable and often necessary aspect
of networking, but it is complex and requires a thorough under-
standing of networking principles.
Establishing a Tunnel
The Firewall Adapter creates a tunnel or channel between two endpoints, so that
the data or information between these endpoints is secure.
This Tunnel is where you enable or disable the tunnel. Click the radio button
next to Enable to enable the tunnel. Click the radio button next to Disable to
disable a tunnel entry.
Once the tunnel is enabled, enter the name of the tunnel in the Tunnel Name
field. This is to allow you to identify the tunnel and does not have to match the
name used at the other end of the tunnel.
42
Instant Broadband
®
Series
USB VPN & Firewall Adapter
Local Secure Group and Remote Secure Group
The Local Secure Group is the computer(s) on your LAN that can access the
tunnel. The Remote Secure Group is the computer (s) on the remote end of the
tunnel that can access the tunnel. Under Local Secure Group and Remote
Secure Group, you may choose one of three options: Subnet, IP Address, and
IP Range. Under Remote Secure Group, you have two additional options: Host
and Any.
Note: The IP Addresses and Subnet Mask values used here are for example
only. Do not try to use them for your actual setup. Obtain the relevant infor-
mation from your own network to accurately configure your Firewall
Adapter.
• Subnet - If you select Subnet (which is the default), this will allow all
computers on the local subnet to access the tunnel. In the example shown
in Figure 7-11, all Local Secure Group computers with IP Addresses
192.168.1.xxx will be able to access the tunnel. All Remote Secure Group
computers with IP Addresses 192.168.2.xxx will be able to access the tun-
nel (in your settings, use the IP Addresses appropriate for your VPN).
When using the Subnet setting, the default values of 0 should remain in
the last fields of the IP and Mask settings.
Figure 7-11
Note: It is possible to set up your Firewall Adapter using any combination
of the three settings under Local Secure Group and the five settings under
Remote Secure Group. For instance, when Subnet is chosen on the local
end of the tunnel, Subnet does not have to be chosen at the remote end. So
a single IP Address could be chosen to access the tunnel on the local end
and a range of IP Addresses could be set at the remote end of the tunnel.
43

Advertisement

Table of Contents
loading

Table of Contents