Linksys WRT54GS Network Router User Manual


 
27
Chapter 5: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall
Wireless-G Broadband Router with SpeedBooster
The Security Tab - Firewall
Firewall Protection. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of
data packets entering your network environment.
Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous
Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the
Router’s firewall.
IPSec Pass-through. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click Enable. IPSec Pass-
Through is enabled by default.
PPTP Pass-through. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click Enable. PPTP Pass-
Through is enabled by default.
L2TP Pass-through. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click Enable. L2TP Pass-Through
is enabled by default.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Figure 5-24: Security Tab - Firewall
Figure 5-25: Security Tab - VPN Passthrough
firewall: a set of related programs located at a
network gateway server that protects the resources
of a network from users from other networks.
ipsec: a VPN protocol used to implement
secure exchange of packets at the IP layer
pptp: a VPN protocol that allows the Point to Point Protocol
(PPP) to be tunneled through an IP network. This protocol is
also used as a type of broadband connection in Europe
vpn: a Vsecurity measure to protect data as it leaves
one network and goes to another over the Internet