Cisco Profile Series User Manual Download Page 1

USER GUIDE

BUSINESS SERIES

10/100 4-Port  

VPN Router

Model:

 RV042

Summary of Contents for Profile Series

Page 1: ...USER GUIDE BUSINESS SERIES 10 100 4 Port VPN Router Model RV042 ...

Page 2: ...ebsite addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Security www linksys com security Copyright an...

Page 3: ...hysical Installation 4 Horizontal Placement 4 Wall Mounting Placement 4 Cable Connections 4 Chapter 4 Advanced Configuration 6 Overview 6 How to Access the Web Based Utility 6 System Summary 6 System Information 7 Configuration 7 Port Statistics 7 Network Setting Status 8 Firewall Setting Status 8 VPN Setting Status 8 Log Setting Status 8 Setup Tab Network 9 Network 9 Setup Password 12 Password 13...

Page 4: ... 26 Diagnostic 26 System Management Factory Default 27 Factory Default 27 System Management Firmware Upgrade 27 Firmware Upgrade 27 Restart 28 System Management Setting Backup 28 Import Configuration File 28 Export Configuration File 28 Port Management Port Setup 28 Basic Per Port Config 28 Port Management Port Status 29 Port Status 29 Firewall General 29 General 29 Firewall Access Rules 30 Access...

Page 5: ...2000 XP orVista 58 Introduction 58 Computer using VPN client software to VPN Router 58 Linksys QuickVPN Instructions 58 Router Configuration 58 Export a Client Certificate from the Router 58 Add VPN Client Users 59 Linksys QuickVPN Client Installation and Configuration 59 Install from the CD ROM 59 Download from the Internet 60 Install the Client Certificate 60 Use of the Linksys QuickVPN Software...

Page 6: ...Router B 68 Configuration of Scenario 2 69 Configuration of the One to One NAT Rules 69 Configuration of Router B 70 Configuration of Router A 70 Appendix E Bandwidth Management 72 Overview 72 Creation of New Services 72 Creation of New Bandwidth Management Rules 73 Appendix F Firmware Upgrade 74 Overview 74 How to Access the Web Based Utility 74 Upgrade the Firmware 74 Alternative Firmware Upgrad...

Page 7: ...ftware License Agreement 84 END OF SCHEDULE 1 85 Schedule 2 85 GNU GENERAL PUBLIC LICENSE 85 END OF SCHEDULE 2 88 Schedule 3 88 OpenSSL License 89 Original SSLeay License 89 END OF SCHEDULE 3 90 Appendix K Regulatory Information 91 FCC Statement 91 Safety Notices 91 Industry Canada Statement 91 Avis d Industrie Canada 91 User Information for Consumer Products Covered by EU Directive 2002 96 EC on ...

Page 8: ... private dedicated leased line for a private network It can be used to create secure networks linking a central office with branch offices telecommuters and or professionals on the road There are two basic ways to create a VPN connection VPN Router to VPN Router computer using VPN client software to VPN Router TheVPN Router creates a tunnel or channel between two endpoints so that data transmissio...

Page 9: ...with her office s VPN settings She accesses the VPN client software and connects to the VPN Router at the central office As VPNs use the Internet distance is not a factor Using theVPN the businesswoman now has a secure connection to the central office s network as if she were physically connected Internet Central Office Off Site Notebook with VPN Client Software VPN Router Computer to VPN Router F...

Page 10: ...aults Warm Reset If the Router is having problems connecting to the Internet press and hold in the Reset button for a second using the tip of a pen This is similar to pressing the power button on your computer to reboot it Reset to Factory Defaults If you are experiencing extreme problems with the Router and have tried all other troubleshooting measures press and hold in the Reset button for 30 se...

Page 11: ...responsible for damages incurred by insecure wall mounting hardware Follow these instructions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 57 mm 2 24 inches apart Insert a screw into each hole and leave 2 mm 3 0 ...

Page 12: ...e using the DMZ Internet port then connect an Ethernet cable to the DMZ Internetport Connecttheotherendtoanetwork device such as a modem or public server Connect to the Internet Port Connect to the DMZ Internet Port Power on the cable or DSL modem If you have a 4 network device connected to the DMZ Internet port power on the network device Connect the included power adapter to the Router s 5 Power...

Page 13: ...irewall General screen has been enabled then users with administrative privileges can remotely access the web based utility Use http WAN IP address of the Router or use https WAN IP address of the Router if you have enabled the HTTPS feature A login screen prompts you for your User name and 2 Password Enter admin in the User name field and enter admin in the Password field You can change the Passw...

Page 14: ...o purchase a license to use this service click Go buy YouwillberedirectedtoalistofLinksysresellersonthe Linksys website Then follow the on screen instructions Register If you already have a license click Register You will be redirected to the Trend Micro ProtectLink Gateway website Then follow the on screen instructions NOTE To have your e mail checked you will need to provide the domain name and ...

Page 15: ... It shows the DDNS settings of the Router s WAN port s and hyperlinks to the Setup DDNS screen DMZ Host It shows the DMZ private IP address and hyperlinks to the Setup DMZ Host screen The default is Disabled Firewall Setting Status SPI Stateful Packet Inspection It shows the status On Off of the SPI setting and hyperlinks to the Firewall General screen DoS Denial of Service It shows the status On ...

Page 16: ... a host and domain name In most cases you can leave these fields blank LAN Setting The LAN MAC address of the Router is displayed Device IP Address and Subnet Mask The default values are 192 168 1 1 for the Router s local IP address and 255 255 255 0 for the subnet mask Multiple Subnet You can add more Class C networks to expand the network Select this option to enable the Multiple Subnet feature ...

Page 17: ...ltaneously connect two broadband connections to theRouter OntheSystemManagement Dual WANscreen you can specify using one as a primary connection with Smart Link Backup or using both connections in concert with Load Balance The DMZ setting allows one network PC to be exposed to the Internet to use special purpose services such as Internet gaming or videoconferencing WAN ConnectionType Configure the...

Page 18: ...outer to automatically re establish your connection as soon as you attempt to access the Internet again Enter the number of minutes you want to have elapsed before your Internet access disconnects The default Max Idle Time is 5 minutes Keep Alive Interval If you select the Keep Alive option the Router will send keep alive packets as often as you specify The default Interval is 30 seconds Keep Aliv...

Page 19: ...ignal User Name and Password Enter your account s User Name and Password The maximum number of characters is 60 Heart Beat Server Enter the IP address of the Heart Beat server Click Save Settings to save your changes or click Cancel Changes to undo them DMZ Static IP is automatically selected There are two different DMZ settings Subnet and Range DMZ Subnet Subnet To specify a subnet select this op...

Page 20: ...our time zone The default is GMT 08 00 Pacific Time US Canada Tijuana DaylightSaving Tousethedaylightsavingfeature select Enabled Enter the Month and Day of the start date and then enter the Month and Day of the end date NTP Server Enter the URL or IP address of the NTP server The default is time nist gov Manual Setup Time Manual Hours Minutes Seconds Enter the time Month Day Year Enter the date C...

Page 21: ...lect the Service you want IP Address Enter the IP address of the server that you want the Internet users to access Enable SelectEnabletoenablethisportrangeforwarding entry If the Service you need is not listed in the menu click Service Management to add the new service The Service Management screen appears Service Management Service Name Enter a name Protocol Select the protocol it uses Port Range...

Page 22: ...tion to view the Port Triggering entries Port Triggering Table List Click Refresh to update the on screen information Click Close to exit this screen and return to the Forwarding screen On the Forwardingscreen click Save Settings to save your changes or click Cancel Changes to undo them Setup UPnP Universal Plug and Play UPnP can be used to set up public services on your network When the UPnP func...

Page 23: ...nge of 209 19 28 16 to 209 19 28 31 with 209 19 28 16 used as the Wide Area Network WAN or NAT public IP address of the Router The address range of 192 168 168 1 to 192 168 168 255 is used for the devices on the LAN With One to One NAT the devices with the internal IP addresses of 192 168 168 2 to 192 168 168 15 may be accessed at the corresponding external IP addresses NOTE The Router s WAN IP ad...

Page 24: ...ant to use www dyndns org www 3322 org or www oray net Thenregisteradomain name DDNS WAN1 2 If you have enabled the Dual WAN feature then you will have two ports WAN1 and WAN2 available for DDNS service DDNS Service The DDNS feature is disabled by default To enable this feature select DynDNS org 3322 org or Oray net PeanutHull DDNS DynDNS org Setup DDNS DynDNS org User name Enter your DynDNS org a...

Page 25: ...o configure the dynamic and static routing settings Setup Advanced Routing Advanced Routing Dynamic Routing The Router s dynamic routing feature can be used so the Router will automatically adjust to physical changes in the network s layout Using the dynamic RIP protocol the Router calculates the most efficient route for the network s data packets to travel between the source and the destination b...

Page 26: ...lue maximum is 15 This indicates the number of nodes that a data packet passes through before reaching its destination A node is any device on the network such as a computer or router Interface Select the appropriate interface The Interface tells you whether your network is on the LAN WAN1 or WAN2 DMZ If the gateway router is on a LAN port then select LAN If you re connecting to another network th...

Page 27: ...ll IP addresses and MAC addresses to the Static IP list click Select All To update the on screen information click Refresh To exit this screen and return to the Setup screen click Close Static IP Address Enter the static IP address You can enter 0 0 0 0 if you want the Router to assign a static IP address to the device MAC Address Enter the MAC address of the device Name Enter a descriptive name f...

Page 28: ...e For all network clients using the DHCP server the Client Table shows the current DHCP Client information Client Host Name This is the name assigned to a client host IP Address It is the dynamic IP address assigned to a client MAC Address This indicates the MAC address of a client Leased Time It displays the amount of time a network user will be allowed connection to the Router with their current...

Page 29: ...ateway ISP Host Select this option to ping the ISP Host Then enter the IP address Remote Host Select this option to ping the Remote Host Then enter the IP address DNS Lookup Host Select this option to ping the DNS Lookup Host Then enter the IP address Click Save Settings to save your changes or click Cancel Changes to undo them Load Balance System Management Dual WAN Load Balance Network Service D...

Page 30: ... Delete selected service Click Save Settings to save your changes or click Cancel Changes to undo them Click Exit to return to the Dual WAN screen Source IP Enter the source IP address or range If you need Service Binding only then you can keep the default which is 0 Destination IP Enter the destination IP address or range If you need Service Binding only then you can keep the default which is 0 I...

Page 31: ...ndwidth Management screen If you want to modify a service you have created select it and click Update this service Make changes Click Save Settings to save your changes or click Cancel Changes to undo them Click Exit to return to the Bandwidth Management screen If you want to delete a service you have created select it and click Delete selected service Click Save Settings to save your changes or c...

Page 32: ... traffic or select Downstream for inbound traffic Priority Select High Middle or Low High priority services will share 30 of the total system bandwidth Middle priority services will share 60 of the total system bandwidth Low priority services will share 10 of the total bandwidth The default is Middle Enable Select Enable to use this Priority rule Click Add to List and configure as many rules as yo...

Page 33: ...ing which are used for troubleshooting network problems The Internet has a service called the Domain Name Service DNS which allows users to enter an easily remembered host name such as www linksys com instead of numerical TCP IP addresses to access Internet resources The DNS NameLookuptoolwillreturnthenumericalTCP IPaddress of a host name The ping test bounces a packet off a machine on the Interne...

Page 34: ...e Factory Default Confirmation System Management Firmware Upgrade You can use this feature to upgrade the Router s firmware to the latest version System Management Firmware Upgrade Firmware Upgrade Todownloadthefirmware refertotheFirmwareDownload instructions If you have already downloaded the firmware onto your computer then click the Browse button to look for the extracted file Firmware Upgrade ...

Page 35: ...d Click Browse and then select the appropriate configuration file Import After you select the file click Import This process may take up to a minute Then restart the Router so that the changes will take effect Export Configuration File Export To export the Router s current configuration file click Export File Download Click Save and then select the location where you want to store your backup pref...

Page 36: ...to negotiation The status of the feature is displayed Statistics For the selected port the Statistics table displays the following Port Receive Packet Count The number of packets received is displayed Port Receive Packet Byte Count The number of packet bytes received is displayed Port Transmit Packet Count The number of packets transmitted is displayed Port Transmit Packet Byte Count The number of...

Page 37: ...un the risk of losing access to Internet sites created using this programming language To block Java applets select Java Cookies A cookie is data stored on your PC and used by Internet sites when you interact with them To block cookies select Cookies ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of losing accesstoInternetsitescreatedusingthisprogrammin...

Page 38: ...f the access rule is displayed To enable or disable a rule click the Enable check box Action The Action Allow or Deny is displayed Service The Service is displayed Source Interface The Source Interface LAN or WAN1 2 is displayed Source The specific Source is displayed Destination The specific Destination is displayed Time The time interval to which the access rule applies is displayed Day The days...

Page 39: ...s selected If the Allow Policies option is enabled on the Log System Log screen then the log will include log events from the Allow access rules on the Firewall Access Rules screen regardless of the option Log packets match this rule Source Interface Select WAN1 WAN2 LAN or Any Source Select the Source IP address es for the access rule If it can be any IP address select Any If it is one IP address...

Page 40: ...nforce it Click Save Settings to save your changes or click Cancel Changes to undo them NOTE The content filter rules will be automatically disabled if the Trend Micro ProtectLink service is activated on the Router ProtectLink For information about the ProtectLink tab refer to Appendix G Trend Micro ProtectLink Gateway Service VPN Summary This screen displays general information about the Router s...

Page 41: ...tus of the VPN tunnel The test result will be updated in the Status column If the tunnel is connected a Disconnect button will be available so you can end the connection Config Click Edit to open a new screen where you can change the tunnel s settings Refer to the Gateway to Gateway or Client to Gateway section for more information Click the Trash Can icon to delete all of your tunnel settings for...

Page 42: ...ntify multiple tunnels and does not have to match the name used at the other end of the tunnel Interface Select the appropriate WAN port WAN1 or WAN2 available if the Dual WAN feature is enabled Enable Check this box to enable a VPN tunnel When you create a VPN tunnel this check box will be disabled Local Group Setup Local Security GatewayType Select the type you want to use IP Only IP Domain Name...

Page 43: ...DN Authentication The Local Security Gateway will be a dynamic IP address so you do not need to enter the IP address When the Remote Security Gateway requests to create a tunnel with the Router the Router will work as a responder Local Security Gateway Type Dynamic IP E mail Addr USER FQDN Authentication E mail address Enter the e mail address for authentication Local Security GroupType Select the...

Page 44: ...ess of the remoteVPN device via its public DNS records IP Domain Name FQDN Authentication The IP address and domain name ID must match the Local Gateway of the remote VPN device and they can only be used for one tunnel connection Remote Security Gateway Type IP Domain Name FQDN Authentication IP address Select this option if you know the static IP address of the remote VPN device at the other end ...

Page 45: ...nge of IP addresses within a subnet that will be able to access the tunnel Remote Security Group Type IP Range IP range Enter the range of IP addresses IPSec Setup In order for any encryption to occur the two ends of a VPN tunnel must agree on the methods of encryption decryption and authentication This is done by sharing a key to the encryption code For key management the default mode is IKE with...

Page 46: ...exadecimal characters e g My_ 123 or 4d795f40313233 This field allows a maximum of 30 characters and or hexadecimal values Both ends of the VPN tunnel must use the same Preshared Key It is strongly recommended that you change the Preshared Key periodically to maximize VPN security Manual If you select Manual you generate the key yourself and no key negotiation is needed Manual key management is us...

Page 47: ...ays accept compression even if compression is not enabled Keep Alive Keep Alive helps maintain IPSec VPN tunnel connections If a connection is dropped and detected it will be re established immediately Select this option to use this feature AH Hash Algorithm The AH Authentication Header protocol describes the packet format and default standards for packet structure With the use of AH as the securi...

Page 48: ...rface Select the appropriate WAN port WAN1 or WAN2 available if the Dual WAN feature is enabled Enable Check this box to enable a VPN tunnel Local Group Setup Local Security GatewayType Select the type you want to use IP Only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication Dynamic IP Domain Name FQDN Authentication or Dynamic IP E mail Addr USER FQDN Authentication Follo...

Page 49: ...or authentication Local Security GroupType Select the local LAN user s behind the Router that can use this VPN tunnel Select the type you want to use IP Subnet or IP Range Follow the instructions for the type you want to use NOTE The Local Security GroupType you select should match the Remote Security Group Type selected on the VPN device at the other end of the tunnel After you have selected the ...

Page 50: ...n if you do not know the static IP address of the remote computer but you do know its domain name Then enter the remote computer s domain name on the Internet The Router will retrieve the IP address of the remote VPN device via its public DNS records E mail address Enter the e mail address as an ID Dynamic IP Domain Name FQDN Authentication The Local Security Gateway will be a dynamic IP address s...

Page 51: ... host name and domain name for a specific computer on the Internet When the remote computer requests to create a tunnel with the Router the Router will work as a responder E mail Address UserFQDN Remote Client E mail Address UserFQDN E mail address Enter the e mail address of the user FQDN Microsoft XP 2000 VPN Client Dynamic IP users such as PPPoE or DHCP users who use the Microsoft VPN client so...

Page 52: ...nnel must use the same Phase 2 Encryption setting Phase 2 Authentication Select a method of authentication NULL MD5 or SHA The authentication method determines how the ESP packets are validated MD5 is a one way hashing algorithm that produces a 128 bit digest SHA is a one way hashing algorithm that produces a 160 bit digest SHA is recommended because it is more secure Both ends of the VPN tunnel m...

Page 53: ... IP datagrams Select this option if you wanttheRoutertoproposecompressionwhenitinitiatesa connection If the responders reject this proposal then the Router will not implement compression When the Router works as a responder it will always accept compression even if compression is not enabled Keep Alive Keep Alive helps maintain IPSec VPN tunnel connections If a connection is dropped and detected i...

Page 54: ...or Admin By default the certificate file is named RV042_ MMDD _ HHMM pem which you can rename MMDD stands for month and day HHMM stands for hours and minutes Follow the on screen instructions to select the location where you want to store your certificate Export Certificate for Client The certificate for the client must be placed in the install directory of the QuickVPN client software To save the...

Page 55: ... default is 192 168 1 200 Range End Enter the ending LAN IP address of the range allotted to PPTP VPN clients The default is 192 168 1 204 NOTE The LAN IP address range for PPTP VPN clients should be outside of the normal DHCP range of the Router Users Setting The Router uses this information to identify authorized PPTP VPN clients User Name Enter a name for the PPTP VPN client New Password Enter ...

Page 56: ...r the e mail address that will receive your log files If you do not want copies of the log information e mailed to you then leave this field blank Log Queue Length You can designate the length of the log that will be e mailed to you The default is 50 entries so unless you change this setting the Router will e mail the log to you when there are more than 50 log entries Log Time Threshold You can de...

Page 57: ...ent Type The type of log event is displayed Message The message associated with each log event is displayed To update a log click Refresh To clear a log click Clear To exit the System Log screen and return to the Log System Log screen click Close Outgoing LogTable To view the outgoing log information click this option Outgoing Log Table Time The time of each log event is displayed You can sort eac...

Page 58: ...w to run the Basic Setup Wizard To use the WAN2 DMZ Internet port as a WAN 2 Internet port select Dual WAN To use the WAN2 DMZ Internet port as a DMZ port select DMZ Then click Next to continue Click Exit if you want to exit the Setup Wizard Dual WAN or DMZ Your Internet Service Provider ISP may require you 3 to use a host and domain name for your Internet connection If your ISP requires them comp...

Page 59: ...ific DNS server IP address select Use the Following DNS Server Addresses and enter the DNS server IP addresses you want to use you must enter at least one Click Next to continue and proceed to step 6 Click Previous if you want to return to the previous screen Click Exit if you want to exit the Setup Wizard Obtain an IP Automatically Static IP Complete the Static IP Subnet Mask and Default Gateway ...

Page 60: ...t is 5 minutes If you select the Keep alive option the Router will keep the connection alive by sending out a few data packets periodically so your ISP thinks that the connection is still active This option keeps your connection active indefinitely even when it sits idle The default Redial Period is 30 seconds The default Keepalive Interval is 30 seconds The default Keepalive Retry Times is 5 time...

Page 61: ...he Access Rule Setup Wizard This screen explains the Access Rules including the 2 Router s Default Rules Click Next to continue Click Exit if you want to exit the Setup Wizard Access Rules Policy From the drop down menu select 3 Allow or Deny depending on the intent of the Access Rule Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit ...

Page 62: ...e Setup Wizard Select the Source Select the Destination IP address es for this Access 7 Rule If it can be any IP address select Any If it is one IP address select Single and enter the IP address If it is a range of IP addresses select Range and enter the range of IP addresses Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the Setup...

Page 63: ...een will appear Support Access a variety of resources on the Support page of the Linksys website www linksys com You must have an active Internet connection before you can visit the Linksys website Support Manual If you want the latest version of this User Guide click On Line Manual The Support page of the Linksys website appears Followtheon screeninstructionstoaccesstheDownloads page for the 10 1...

Page 64: ...System LED should be green and not flashing If the System LED is flashing then power off all of your network devices including the modem Router and computers Then power on each device in the following order Cable or DSL modem 1 Router 2 Computer 3 Check the cable connections The computer should be connected to one of the ports numbered 1 4 on the Router and the modem must be connected to the Inter...

Page 65: ...l Office Off Site Notebook with VPN Client Software VPN Router Computer to VPN Router Linksys QuickVPN Instructions This appendix has two sections The first section explains how to do the following for each QuickVPN client using the Router s web based utility Export a client certificate 1 Configure a user name and password 2 Add the QuickVPN client to the list 3 The second section explains how to ...

Page 66: ...LAN IP address is the default 192 168 1 1 then a pop up window will appear when you first save these settings You will be asked if you want the Router to automatically change its LAN IP address to prevent conflicting IP addresses To allow the Router to change its LAN IP address click Yes If there is an IP address conflict the QuickVPN client will not be able to connect to the Router Linksys QuickV...

Page 67: ...nstalled on the computer License Agreement Copying Files Installation Complete Click 10 Finish to complete the installation Proceed to the section Install the Client Certificate Install the Client Certificate For each QuickVPN client save the client certificate to the directory where the QuickVPN program is installed Example C Program Files Linksys QuickVPN Client NOTE The certificate for the clie...

Page 68: ...us screen appears The screen displays the IP address of the remote end of the VPN tunnel the time and date theVPN tunnel began and the total length of time the VPN tunnel has been active QuickVPN Tray Icon Connection QuickVPN Status To terminate the VPN tunnel click Disconnect To change your password click Change Password For information click Help If you clicked Change Password and have permissio...

Page 69: ...ec VPN Tunnel Remote Gateway Using Static IP NOTE Each computer must have a network adapter installed Configuration of the RVL200 Follow these instructions for the first VPN Router designated RVL200 The other VPN Router is designated the RV042 Launch the web browser for a networked computer 1 designated PC 1 Access the web based utility of the RVL200 Refer to 2 the User Guide of the RVL200 for det...

Page 70: ...dress B B B B of the RV042 will be automatically detected For the Local Security GroupType select Subnet Enter the RV042 s local network settings in the IPAddressand Subnet Mask fields RV042 VPN Settings For the Remote Security Gateway Type select 9 IP Only Enter the RVL200 s WAN IP address in the IP Address field For the Remote Security Group Type select 10 Subnet Enter the RVL200 s local network...

Page 71: ... Only The WAN IP address A A A A of the RVL200 will be automatically detected For the Local Security GroupType select Subnet Enter the RVL200 s local network settings in the IP Address and Subnet Mask fields RVL200 IPSec VPN Settings For the Remote Security Gateway Type select 8 IP Only Then select IP by DNS Resolved Enter the RV042 s domain name in the field provided For the Remote Security Group...

Page 72: ... correctly Configuration when Both Gateways Use Dynamic IP Addresses ThisexampleassumesbothGatewaysareusingdynamicIP addresses If the Remote Gateway uses a static IP address refer to Configuration when the Remote Gateway Uses a Static IP Address If only the Remote Gateway uses a dynamic IP address refer to Configuration when the Remote Gateway Uses a Dynamic IP Address RVL200 Dynamic IP A A A A wi...

Page 73: ...to Gateway tab Enter a name in the 5 Tunnel Name field Select the appropriate Interface 6 WAN1 or WAN2 Select 7 Enable For the Local Security Gateway Type select 8 IP Only The WAN IP address B B B B of the RV042 will be automatically detected For the Local Security GroupType select Subnet Enter the RV042 s local network settings in the IPAddressand Subnet Mask fields RV042 VPN Settings For the Rem...

Page 74: ...PSec VPN Routers model number RVL200 one of which is connected to the Internet Two 10 100 4 Port VPN Routers model number RV042 one of which is connected to the Internet Configuration of Scenario 1 In this scenario Router A is the RVL200 Initiator while Router B is the RVL200 Responder 192 168 2 100 192 168 1 101 WAN 192 168 99 22 Router B RVL200 Responder LAN 192 168 2 0 24 WAN 192 168 99 11 NAT ...

Page 75: ...llow these instructions for Router B Launch the web browser for a networked computer 1 designated PC 2 Access the web based utility of Router B Refer to the 2 User Guide of the RVL200 for details Click the 3 IPSec VPN tab Click the 4 Gateway to Gateway tab Enter a name in the 5 Tunnel Name field For the VPN Tunnel setting select 6 Enable For the Local Security Gateway Type select 7 IP Only The WAN...

Page 76: ...168 11 101 Follow these instructions for the one to one NAT rule on NAT 1 RV042 Launch the web browser for a networked computer 1 Access the web based utility of NAT 1 RV042 Refer to 2 Chapter 4 Advanced Configuration for details Click the 3 Setup tab Configuration of Scenario 2 In this scenario Router B is the RVL200 Initiator while Router A is the RVL200 Responder Router B will have the Remote S...

Page 77: ...ields For the Remote Security Gateway Type select 8 IP Only Enter 192 168 99 1 in the IP Address field Router B s IPSec VPN Settings For the Remote Security Group Type select 9 Subnet Enter Router A s local network settings in the IP Address and Subnet Mask fields In the IPSec Setup section select the appropriate 10 encryption authentication andotherkeymanagement settings In the 11 Preshared Key f...

Page 78: ...twork settings in the IP Address and Subnet Mask fields In the IPSec Setup section select the appropriate 10 encryption authentication andotherkeymanagement settings In the 11 Preshared Key field enter a string for this key for example 13572468 If you need more detailed settings click 12 Advanced Settings Otherwise click Save Settings ...

Page 79: ...nt QoS Bandwidth Management On the 5 Service Management screen enter a name such as Vonage VoIP in the Service Name field Add Vonage VoIP Service From the 6 Protocol drop down menu select the protocol the VoIP service uses For example some VoIP devices use UDP Enter its SIP port range in the 7 Port Range fields For example you can set the Port Range to 5060 to 5070 to make sure that all active por...

Page 80: ...In the 12 Max Rate field enter the maximum rate for the maximum bandwidth For example you can set a maximum rate of 80 kbit sec Select 13 Enable to enable this rule After you have set up the rule click 14 Add to list Set up a rule for Vonage 2 Select 15 Vonage 2 from the Service drop down menu Enter the IP address or range you need to control To 16 include all internal IP addresses keep the defaul...

Page 81: ...ent Firmware Upgrade The Support page of the Linksys website appears 4 Follow the on screen instructions to access the Downloads page for the 10 100 4 Port VPN Router model number RV042 Download the firmware upgrade file 5 Extract the file on your computer 6 In the Firmware Upgrade section of the 7 Firmware Upgrade screen click the Browse button to locate the extracted file After you have selected...

Page 82: ...tract exe 7 file to an appropriate location on your computer Double click the 8 exe file In the 9 Router IP field enter the IP address of the Router Firmware Upgrade Utility Login In the 10 Password field enter the password for access to the Router Click 11 Next and then follow the on screen instructions ...

Page 83: ...ddress of the Router if you have enabled the HTTPS feature A login screen prompts you for your User name and 2 Password Enter admin in the User name field and enter admin in the Password field You can change the Password on the Setup Password screen Then click OK Login Screen How to Purchase Register or Activate the Service You can purchase register or activate the service using the System Summary...

Page 84: ...o use this service click this link You will be redirected to a list of Linksys resellers on the Linksys website Then follow the on screen instructions I have purchased ProtectLink Gateway and want to register it If you already have a license click this link You will be redirected to the Trend Micro ProtectLink Gateway website Then follow the on screen instructions NOTE To have your e mail checked ...

Page 85: ... days keep the default All day 24 hours To specify hours select Specify business hours For morning hours select Morning and then select the appropriate From and To times For afternoon hours select Afternoon and then select the appropriate From and To times Web Reputation Select the appropriate security level High This level blocks a higher number of potentially malicious websites but also increase...

Page 86: ...ppropriate messages are forwarded to your network ProtectLink Email Protection Email Protection NOTE To have your e mail checked you will need to provide the domain name and IP address of your e mail server If you do not know this information contact your ISP https us imhs trendmicro com linksys To set up e mail protection click this link You will be redirected to theTrend Micro ProtectLink Gatewa...

Page 87: ...automatically displayed License expires on The date and time your license expires are displayed Renew To renew your license click Renew Then follow the on screen instructions Add Seats Each seat allows an e mail account to use Email Protection To add seats to your license click Add Seats Then follow the on screen instructions ...

Page 88: ...DNS 3322 PeanutHull NAT Many to One One to One DMZ DMZ Port DMZ Host Routing Static and RIP v1 v2 QoS Port based QoS Configurable per LAN Port Service based QoS Supports Rate Control or Priority Rate Control Upstream Downstream Bandwidth can be Configured per Service Priority Each Service can be Mapped to One of the 3 Priority Levels VPN IPSec 50 IPSec Tunnels for Branch Office Connectivity QuickV...

Page 89: ...Materials Authorization RMA number You are responsible for properly packaging and shipping your product to Linksys at your cost and risk You must include the RMA number and a copy of your dated proof of Appendix I Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period which begins on the date of purc...

Page 90: ...ada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies includ...

Page 91: ...se Agreement THIS LICENSE AGREEMENT IS BETWEEN YOU AND CISCO LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY...

Page 92: ...n You may terminate this License at any time by destroying all copies of the Software and documentation Your rights under this License will terminate immediately without notice from Linksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Li...

Page 93: ...vent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under t...

Page 94: ...cial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts u...

Page 95: ...ail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this Li...

Page 96: ...ARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product include...

Page 97: ...AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS...

Page 98: ...r than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning ...

Page 99: ...nice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady S...

Page 100: ...ο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages ...

Page 101: ...ndezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworden...

Page 102: ... zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje op...

Page 103: ...Website http www linksys com Support Site http www linksys com support FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization http www linksys com warranty NOTE Details on warranty and RMA issues can be found in the Warranty section of this Guide 8061710C JL ...

Reviews: