protocols – IPsec, PPTP, and L2TP. These protocols allow remote users to
establish a secure connection to another network. I f your service provider
supports VPNs, then these protocols can be used to create an authenticated and
encrypted tunnel for passing secure data over the Internet (that is, a traditionally
shared data network).
■ IPsec (Internet Protocol Security) — Encrypts and authenticates entire IP packets
and encapsulates them into new IP packets for secure communications between
networks.
■ PPTP (Point-to-Point Tunneling Protocol) — Provides a secure tunnel for remote
client access to a PPTP security gateway. PPTP includes provisions for call
origination and flow control required by ISPs.
■ L2TP (Layer 2 Tunneling Protocol) — Merges the best features of PPTP and the
Layer 2 Forwarding (L2F) protocol. Like PPTP, L2TP requires that the ISP’s routers
support the protocol.
HARDWARE DESCRIPTION
The 150Mbps Wireless-N 3G Mobile Wireless Router, from herein
refered to as 3G Mobile Wireless Router, connects to the Internet through
its RJ-45 WAN port. It connects directly to your PC or to a local area network
using its RJ-45 Fast Ethernet LAN port.
The 3G Mobile Wireless Router includes an LED display on the front panel for system
power and port indications that simplifies installation and network troubleshooting.
5