beautypg.com

Chapter 4, Configuring user tunnels, Chapter 4 configuring user tunnels – Panasonic 7 User Manual

Page 75

Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

background image

75

Chapter 4
Configuring user tunnels

The Nortel VPN Router uses the Internet and tunneling protocols to create secure
connections. The following sections describe configuring the tunnel portion of the
Nortel VPN Router. The configuration process includes setting up the

authentication table and specific tunnel parameters, such as IPsec encryption,

L2TP access concentrators, and L2F network access servers. Figure 9 shows a
typical network illustration with the Nortel VPN Router connected to the PDN

(public data network) and to a remote user through a tunnel.

Figure 9 Tunnel connection configuration

LAN

to Switch

The connection attributes that you configure in the Nortel VPN Router enable the

remote user to create a tunnel into the Nortel VPN Router. However, you are not

configuring the connection from the remote user to the Internet Service Provider

(ISP) at this point. The actual connection to the Nortel VPN Router is a tunnel that

is started from the remote user's PC through its dial-up connection. That

connection is to the Internet (typically using an ISP), through the Internet, and
ends at the Nortel VPN Router on the private, corporate network.

Nortel VPN Router Configuration — Basic Features