User`s guide
Access and Application Support
1-4  
• Security
The RoamAbout R1 supports security features that can deny Internet access to specified 
users, or filter all requests for specific services. The RoamAbout R1’s firewall can also 
block common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with 
zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP 
SYN flooding.
• Virtual Private Network
The RoamAbout R1 supports three of the most commonly used VPN protocols – PPTP, 
L2TP and IPSec. These protocols allow remote users to establish a secure connection to 
their corporate network. If your service provider supports VPNs, then any of these 
protocols can be used to create an authenticated and encrypted tunnel for passing secure 
data over the Internet (i.e., a traditionally shared data network). The VPN protocols 
supported by the RoamAbout R1 are briefly described below.
— Point-to-Point Tunneling Protocol – Provides a secure tunnel for remote 
client access to a PPTP security gateway. PPTP includes provisions for call 
origination and flow control required by ISPs.
— Layer Two Tunneling Protocol – Includes most of the features provided by 
PPTP, but has less overhead and is more suited for managed networks.
— IP Security – Provides IP network-layer encryption. IPSec can support large 
encryption networks (such as the Internet) by using digital certificates for 
device authentication. 










