background image

Appendix A

Troubleshooting

20

EtherFast Cable/DSL VPN Router with 4-Port Switch

Appendix A:  

Troubleshooting

Your computer cannot connect to the Internet. 

Follow these instructions until your computer can connect 

to the Internet:

Make sure that the Router is powered on. The Power 

 

LED should be green and not flashing.
If  the  Power  LED  is  flashing,  then  power  off  all  of 

 

your network devices, including the modem, Router, 

and  computers.  Then  power  on  each  device  in  the 

following order:

Cable or DSL modem

1. 

Router

2. 

Computer

3. 

Check  the  cable  connections. The  computer  should 

 

be connected to one of the ports numbered 1-4 on 

the Router, and the modem must be connected to the 

Internet port on the Router.

The modem does not have an Ethernet port.

The  modem  is  a  dial-up  modem  for  traditional  dial-up 

service. To use the Router, you need a cable/DSL modem 

and high-speed Internet connection.

You cannot use the DSL service to connect manually to 

the Internet.

After  you  have  installed  the  Router,  it  will  automatically 

connect to your Internet Service Provider (ISP), so you no 

longer need to connect manually.

The  DSL  telephone  line  does  not  fit  into  the  Router’s 

Internet port.

The Router does not replace your modem. You still need 

your  DSL  modem  in  order  to  use  the  Router.  Connect 

the  telephone  line  to  the  DSL  modem,  insert  the  setup 

CD  into  your  computer,  and  then  follow  the  on-screen 

instructions.

When  you  double-click  the  web  browser,  you  are 

prompted for a username and password. If you want to 

get rid of the prompt, follow these instructions.

Launch the web browser and perform the following steps 

(these steps are specific to Internet Explorer but are similar 

for other browsers):

Select 

1. 

Tools

 > 

Internet Options

Click the 

2. 

Connections

 tab.

Select 

3. 

Never dial a connection

Click 

4. 

OK

.

The  Router  does  not  have  a  coaxial  port  for  the  cable 

connection.

The Router does not replace your modem. You still need 

your cable modem in order to use the Router. Connect your 

cable  connection  to  the  cable  modem,  insert  the  setup 

CD  into  your  computer,  and  then  follow  the  on-screen 

instructions.

You need to modify the settings on the Router.

Open the web browser (for example, Internet Explorer or 

Firefox), and enter the Router’s IP address in the address 

field  (the  default  IP  address  is 

192.168.1.1

).  When 

prompted, leave the 

User name

 field blank and enter the 

password to the Router (the default is 

admin

). Click the 

appropriate tab to change the settings.

WEB:

 If your questions are not addressed here, 

refer to the Linksys website, 

www.linksys.com

.

Summary of Contents for Linksys EtherFast BEFVP41

Page 1: ...USER GUIDE EtherFast Cable DSL VPN Router with 4 Port Switch Model BEFVP41 EU LA ...

Page 2: ... address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com eu or www linksys com latam Support www linksys com support Glossary www li...

Page 3: ...ty VPN 9 Access Restrictions 12 Applications and Gaming Port Range Forwarding 13 Applications Gaming Port Triggering 14 Applications and Gaming UPnP Forwarding 14 Applications and Gaming DMZ 15 Administration Management 15 Administration Log 16 Administration Diagnostics 17 Administration Factory Defaults 17 Administration Firmware Upgrade 18 Status Gateway 18 Status Local Network 18 Appendix A Tr...

Page 4: ...tatement 25 Safety Notices 25 Industry Canada Statement 25 EC Declaration of Conformity Europe 25 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 26 Appendix F Software License Agreement 30 Software in Linksys Products 30 Software Licenses 30 ...

Page 5: ...sing VPN client software to VPN Router TheVPN Router creates a tunnel or channel between two endpoints so that data transmissions between them are secure A computer with VPN client software can be one of the two endpoints For an Internet Protocol Security IPSec VPN tunnel the VPN Router and any computer with the built in IPSec SecurityManager Windows2000andXP cancreateaVPN tunnel using IPSec Windo...

Page 6: ...ture attacks The VPN Router however does not leave the IP headers decrypted if you enable and set up Perfect Forward Secrecy PFS With PFS both the IP headers and secret keys used to secure the tunnel are encrypted The VPN Router allows users on your local network to secure their data over the Internet using VPN tunnels without having to purchase the extra client licenses that other VPN hardware ma...

Page 7: ...r that port Internet Green The Internet LED lights up when there is a connection made through the Internet port A flashing LED indicates network activity over the Internet port Back Panel Reset There are two ways to reset the Router to its factory default settings Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds You can also restore ...

Page 8: ...nter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Leave the User Name field blank The first time you open the web based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears is the Basic Setup screen ...

Page 9: ... to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Rou...

Page 10: ...setup information Connection Type Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server Enter the IP address of your ISP s Heart Beat server This is provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your...

Page 11: ... to assign IP addresses to This number cannot be greater than 253 The default is 50 DHCP Address Range Displayed here is the range of available IP addresses Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP addres...

Page 12: ...disabled the DHCP server feature is also disabled Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want RIP1 RIP1 Compatible or RIP2 ReceiveRIPVersion Tousedynamicroutingforreception of network data select the protocol you want RIP1 or RIP2 Static Routing A static route is a pre determined pathway that network informationmusttraveltoreachaspecifi...

Page 13: ...A cookie is data stored on your computer and used by Internet sites when you interact with them Select this option to filter cookies Deselect the option to allow cookie usage Filter ActiveX ActiveX is a programming language for websites If youdenyActiveX youruntheriskofnothaving access to Internet sites created using this programming language Select this option to enable ActiveX filtering Deselect...

Page 14: ...other end of the tunnel Local and Remote Secure Group Subnet The default is Subnet All computers on the local subnet will be able to access the tunnel IP and Mask Enter the appropriate addresses The default value of 0 should remain in the last fields of the IP and Mask settings IP Address Only the computer with a specific IP address will be able to access the tunnel IP Addr Enter the appropriate a...

Page 15: ...nge and IKE proposals are secure Pre shared Key This specifies the pre shared key used to authenticate the remote IKE peer Based on this Pre shared key a key is generated to encrypt the data being transmitted over the tunnel at the end of the tunnel the key is decrypted Enter a key of up to 24 alphanumeric characters No special characters or spaces are allowed Both ends of the VPN tunnel must use ...

Page 16: ...y to last before a re key negotiation between each endpoint is completed The default is 3600 seconds Phase 2 The Encryption Authentication and PFS settings are automatically displayed Group Select the Diffie Hellman Group which is a cryptographic technique that uses public and private keys for encryption and decryption Select 768 bit or 1024 bit Key Lifetime Enter the number of seconds you want th...

Page 17: ...uring which the policy will be in effect or select 24 Hours Select any Blocked Services and enter a range of ports 7 in the fields provided If the service you want to block is not listed or you want to edit a service s settings then click Add Edit Service If you want to block websites with specific URL 8 addresses enter each URL in a separate field next to Website Blocking by URL Address If you wa...

Page 18: ...rt For each application enter the starting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming UPnP Forwarding The UPnP Forwarding screen displays preset application settings as well as options to cust...

Page 19: ...h is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc Ext Port Enter the number of the external port used by the server in the Ext Port column Check with the Internet application documentation for more information TCP UDP Select the protocol UDP or TCP for each application You cannot select both protocols Int Port Enter the number of the...

Page 20: ...n SNMP agent such as the Router to the workstation console used to oversee the network The Router then returns information contained in a Management Information Base MIB a data structure that defines what is obtainable from the device and what can be controlled SNMP functions such as statistics configuration and device information are not available without third party management software The Route...

Page 21: ... your changes Administration Diagnostics The ping test allows you to check the connections of your network devices including connection to the Internet Administration Diagnostics PingTest PingTest Parameters PingTarget IP Enter the address of the PC or other device whose connection you wish to test Ping Size Enter the number of bytes that will be sent The default is 60 bytes The range is 60 to 151...

Page 22: ... extracted firmware upgrade file or click Browse to select the extracted firmware upgrade file Upgrade After you have selected the appropriate file click this option and follow the on screen instructions Status Gateway The Router screen displays information about the Router and its current settings Status Gateway Gateway Information Hardware Version The model and version numbers of the Router are ...

Page 23: ...d DHCP Clients Table Click this option to view a list of PCs that are using the Router as a DHCP server DHCP Clients Table DHCP ClientTable The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The DHCP Server IP Address is the IP address of the Router The table lists the Client Hostname IP Address MAC Address and Interface for each DHCP client ...

Page 24: ...rnet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser...

Page 25: ...e Enter a Tunnel Name This name should be unique for 6 this particular tunnel For the Local Secure Group setting select 7 Subnet Then complete the IP and Mask fields refer to your local network s IP address scheme For the Remote Secure Group setting select 8 IP Addr Then enter the IP address of the remote computer on the other end of the tunnel For the Remote Security Gateway setting select 9 IP A...

Page 26: ...ernet One 10 100 RJ 45 Port Local Network Four 10 100 RJ 45 Ports Cabling Type UTP Category 5 or Better LEDs Power Ethernet 1 4 Internet Environmental Dimensions 186 x 48 x 154 mm Unit Weight 360 g Power External 12VDC 1A Certifications FCC CE Operating Temp 0 to 45ºC 32 to 113ºF Storage Temp 20 to 70ºC 4 to 158ºF Operating Humidity 0 to 90 Noncondensing Storage Humidity 5 to 90 Noncondensing Spec...

Page 27: ...h the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may...

Page 28: ...ts not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the j...

Page 29: ... an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning Industry Canada Statement This Class B di...

Page 30: ...vropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo míst...

Page 31: ...ημα από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déche...

Page 32: ... elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ...

Page 33: ...ôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje o...

Page 34: ...S LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PAR...

Page 35: ...nksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAU...

Page 36: ...roprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be di...

Page 37: ... the terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for ...

Page 38: ... to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publ...

Page 39: ...o warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company c...

Page 40: ...ibrary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the...

Page 41: ...e of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code ...

Page 42: ...may not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as su...

Page 43: ... software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITN...

Page 44: ...includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is fr...

Page 45: ...UPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another dis...

Reviews: