User Manual
Table Of Contents
- Chapter 1: Planning Your Network
- Chapter 2: Getting to Know the Wireless-G ADSL Gateway with 2 Phone Ports
- Chapter 3: Connecting the Wireless-G ADSL Gateway
- Chapter 4: Configuring the Gateway
- Chapter 5: Using the Linksys Parental Control Service
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
- Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
- Appendix E: Upgrading Firmware
- Appendix F: Windows Help
- Appendix G: Glossary
- Appendix H: Specifications
- Appendix I: Warranty Information
- Appendix J: Regulatory Information
- Appendix K: Contact Information
5
Chapter 1: Planning Your Network
Why do I need a VPN?
Wireless-G ADSL Gateway with 2 Phone Ports
2) Data Sniffing
Data ā sniffingā is a method used by hackers to obtain network data as it travels through unsecured networks,
such as the Internet. Tools for just this kind of activity, such as protocol analyzers and network diagnostic tools,
are often built into operating systems and allow the data to be viewed in clear text.
3) Man in the Middle Attacks
Once the hacker has either sniffed or spoofed enough information, he can now perform a ā man in the middleā
attack. This attack is performed, when data is being transmitted from one network to another, by rerouting the
data to a new destination. Even though the data is not received by its intended recipient, it appears that way to
the person sending the data.
These are only a few of the methods hackers use and they are always developing more. Without the security of
your VPN, your data is constantly open to such attacks as it travels over the Internet. Data travelling over the
Internet will often pass through many different servers around the world before reaching its final destination.
That's a long way to go for unsecured data and this is when a VPN serves its purpose.