Справочник Пользователя для Motorola 7.7.4
![Motorola](https://files.manualsbrain.com/attachments/83de88ba2280e7232128e8931d7cbd2a38dcc654/common/fit/150/50/0293f422c4d32e7e0f777d5e11bc33c83ea5627f71ddf155374c02a23d9a/brand_logo.png)
22
A typical VPN IPSec Tunnel pass through is diagrammed below:
☛
NOTE:
Typically, no special configuration is necessar y to use the IPSec pass through
feature.
In the diagram, VPN PC clients are shown behind the Motorola Netopia® Gate-
way and the secure ser ver is at Corporate Headquar ters across the WAN. You
cannot have your secure ser ver behind the Motorola Netopia® Gateway.
When multiple PCs are star ting IPSec sessions, they must be star ted one at a
time to allow the associations to be created and mapped.
feature.
In the diagram, VPN PC clients are shown behind the Motorola Netopia® Gate-
way and the secure ser ver is at Corporate Headquar ters across the WAN. You
cannot have your secure ser ver behind the Motorola Netopia® Gateway.
When multiple PCs are star ting IPSec sessions, they must be star ted one at a
time to allow the associations to be created and mapped.
VPN IPSec Tunnel Termination
This Motorola Netopia® ser vice suppor ts termination of VPN IPsec tunnels at the Gateway.
This permits tunnelling from the Gateway without the use of third-par ty VPN client software
on your client PCs. Currently one IPSec VPN tunnel is suppor ted on Motorola Netopia®
2200 and 3300 Series Gateways. Unlike VPN Passthrough, IPsec VPN tunnel is a keyed
feature that you can obtained from Motorola. See
This permits tunnelling from the Gateway without the use of third-par ty VPN client software
on your client PCs. Currently one IPSec VPN tunnel is suppor ted on Motorola Netopia®
2200 and 3300 Series Gateways. Unlike VPN Passthrough, IPsec VPN tunnel is a keyed
feature that you can obtained from Motorola. See
Motorola Netopia®
Gateway
Gateway