06.03.2015 Views

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong> <strong>User</strong> <strong>Manual</strong> (DATA Features)<br />

6.4 Network Connections<br />

This chapter describes the different network connections available with <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>, as well<br />

as the connection types that you can create. <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong> supports both physical and logical<br />

network connections. When clicking the ‘Network Connections’ menu item under ‘System’, the<br />

‘Network Connections’ screen appears, enabling you to configure the various parameters of your<br />

physical connections (the LAN and WAN), and create new connections, using tunneling protocols<br />

over existing connections (such as PPP and VPN).<br />

Figure 6.11 Network Connections<br />

<strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>’s physical network connections are:<br />

LAN – Creating a home/SOHO network<br />

• LAN Bridge (refer to Section 6.4.4).<br />

• LAN Ethernet (refer to Section 6.4.3).<br />

• LAN Wireless 802.11n Access Point (refer to Section 6.4.5).<br />

WAN – Internet Connection<br />

• WAN Ethernet (refer to Section 6.4.6).<br />

The logical network connections available with <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong> are:<br />

WAN – Internet Connection<br />

• Point-to-Point Protocol over Ethernet (refer to Section 6.4.7).<br />

• Point-to-Point Tunneling Protocol (refer to Section 6.4.10).<br />

• Layer 2 Tunneling Protocol (refer to Section 6.4.8).<br />

• WAN-LAN Bridge (refer to Section 6.4.14).<br />

Virtual Private Network over the Internet<br />

• Layer 2 Tunneling Protocol over Internet Protocol Security (refer to Section 6.4.8).<br />

• Layer 2 Tunneling Protocol Server (refer to Section 6.4.9).<br />

• Point-to-Point Tunneling Protocol Virtual Private Network (refer to Section 6.4.10).<br />

• Point-to-Point Tunneling Protocol Server (refer to Section 6.4.11).<br />

• Internet Protocol Security (refer to Section 6.4.12).<br />

• Internet Protocol Security Server (refer to Section 6.4.13).<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!