Ads 468x60px

WiNG How-To Guide Microsoft L2TP/IPSec VPN Client-Overview

IPSec VPN offers the security and encryption features necessary to protect enterprise data, voice, and video traffic as it traverses public or insecure networks. IPSec VPN can be deployed to provide secure point-to-point connectivity between sites as well as provide remote access into the network to users eliminating costly dial-up and leased lines.

IPSec VPN is typically deployed over the public Internet and provides secure encrypted transport for data, voice and video applications over public networks. The main advantage of IPSec over traditional remote access solutions is that the endpoints can securely connect into the corporate network using any Internet connections including dial-up, DSL, Cable Modem or public Wi-Fi hotspots.
This configuration guide focuses on configuring the RF Switch to support end-user VPN tunnels from Microsoft Windows XP platforms using the Microsoft L2TP/IPSec VPN Client. End-user tunnels from third-party VPN clients and branch office VPN tunnels are out of the scope of this document and will be addressed in other How To guides.
Applications:
The Microsoft L2TP/IPSec VPN client and Motorola RF Switch can be used to deliver secure authenticated and encrypted data, voice and video IP services over IP networks providing:
1)  Secure remote access for administrators for remote network configuration, troubleshooting and monitoring.
2)  Secure remote access for applications and resources providing enhanced productivity for remote teleworkers, road warriors and mobile work force.
3)  Secure access and encryption over the air for legacy WLAN deployments which do not support current security standards.

Restrictions:
The following restrictions apply when using the Microsoft L2TP/IPSec VPN client with the Motorola RF Switch:
1)  Only one Crypto Map is supported per virtual interface.
2)  Remote VPN clients must use the same pre-shared-key.
3)  Network addressing for remote clients must be allocated from the same global pool of virtual IP addresses.

0 nhận xét:

Post a Comment