Summary


Note

If the VPN is behind a router, as will often be the case, for this setup to work, the router will have to be configured to automatically forward communications from the appropriate ports to the VPN server, a process called port mapping. The ports used for VPN access are forwarded to the IP for the VPN server.

The ports used for VPN access depend on the VPN protocol used. Point-to-Point Tunneling Protocol (PPTP) uses ports 47 and 1723. Layer Two Tunneling Protocol (L2TP) uses ports 50, 51, and 500.


Here are the key points to remember from this chapter:

  • Because Wi-Fi networks are not physically secure, some level of security protection is a good idea.

  • The level of security protection that you require depends on the confidentiality of the information you are protecting.

  • If you do nothing else, you should change the default SSID for your wireless access point, set it not to broadcast the SSID, set the access point to use WEP encryption, and change the default administrative password for the access point.

  • Complete security for a wireless network is probably impossible, but there are many steps you can take to make your Wi-Fi network more secure.



Anywhere Computing with Laptops. Making Mobile Easier
Anywhere Computing with Laptops. Making Mobile Easier
ISBN: 789733277
EAN: N/A
Year: 2004
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net