background image

A Division of Cisco Systems, Inc.

®

Model No.

WIRED

VPN Router

10/100 4-Port

RV042

User Guide

 

Summary of Contents for RV042

Page 1: ...A Division of Cisco Systems Inc Model No WIRED VPN Router 10 100 4 Port RV042 User Guide ...

Page 2: ...erms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or Warning and is something that could damage your property or the Router word definition This checkma...

Page 3: ...ng the Router 11 Overview 11 Connection Instructions 12 Chapter 5 Configuring the PCs 14 Overview 14 Configuring Windows 98 and Millennium PCs 14 Configuring Windows 2000 PCs 15 Configuring Windows XP PCs 15 Chapter 6 Set Up and Configure the Router 17 Overview 17 How to Access the Web based Utility 20 System Summary Tab 20 Setup Tab Network 23 Setup Tab Password 25 Setup Tab Time 25 Setup Tab DMZ...

Page 4: ...38 VPN Tab Summary 39 VPN Tab Gateway to Gateway 41 VPN Tab Client to Gateway 47 VPN Tab VPN Pass Through 54 Log Tab System Log 54 Log Tab System Statistics 56 Wizard Tab 56 Support Tab 64 Logout Tab 64 Appendix A Troubleshooting 65 Common Problems and Solutions 65 Frequently Asked Questions 75 Appendix B Upgrading Firmware 79 Appendix C Finding the MAC Address and IP Address for Your Ethernet Ada...

Page 5: ...10 100 4 Port VPN Router Appendix G Specifications 91 Appendix H Warranty Information 92 Appendix I Regulatory Information 93 Appendix J Contact Information 94 ...

Page 6: ...CP IP for Windows 98 and Me 14 Figure 5 2 Obtain an IP address automatically for Windows 98 and Me 14 Figure 5 3 Internet Protocol TCP IP for Windows 2000 15 Figure 5 4 Obtain an IP address automatically for Windows 2000 15 Figure 5 5 Internet Protocol TCP IP for Windows XP 16 Figure 5 6 Obtain an IP address automatically for Windows XP 16 Figure 6 1 Router s IP Address 20 Figure 6 2 Password 20 F...

Page 7: ...Dual WAN Load Balance 32 Figure 6 24 SNMP 32 Figure 6 25 DNS Name Lookup 33 Figure 6 26 Ping 33 Figure 6 27 Factory Default 34 Figure 6 28 Are You Sure 34 Figure 6 29 System is Rebooting 34 Figure 6 30 Firmware Upgrade 35 Figure 6 31 Restart 35 Figure 6 32 Setting Backup 35 Figure 6 33 Save File 36 Figure 6 34 Firewall 36 Figure 6 35 Access Rules 37 Figure 6 36 Add a New Access Rule 37 Figure 6 37...

Page 8: ...nection Type 57 Figure 6 54 Obtain an IP Automatically 58 Figure 6 55 Static IP 58 Figure 6 56 PPPoE 58 Figure 6 57 WAN Connection Type WAN2 59 Figure 6 58 Obtain an IP WAN2 59 Figure 6 59 Static IP WAN2 60 Figure 6 60 PPPoE WAN2 60 Figure 6 61 Save Settings 60 Figure 6 62 Access Rules Policy 61 Figure 6 63 Select the Action 61 Figure 6 64 Select the Service 61 Figure 6 65 Select the Log 62 Figure...

Page 9: ... Figure B 1 Upgrade Firmware 79 Figure C 1 IP Configuration Screen 80 Figure C 2 MAC Address Adapter Address 80 Figure C 3 MAC Address Physical Address 81 Figure C 4 MAC Address Clone 81 Figure D 1 Wall Mounting the Router 82 ...

Page 10: ...etwork VPN capability creates encrypted tunnels through the Internet allowing up to 30 remote office or traveling users to securely connect into your office network from off site Users connecting through a VPN tunnel are attached to your company s network with secure access to files e mail and your intranet just as if they were in the building You can also use the VPN capability to allow users on ...

Page 11: ...ow to use the Web Based Utility to set up the Router and configure its settings Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the 10 100 4 Port VPN Router Appendix B Upgrading Firmware This appendix instructs you on how to upgrade the firmware on your Router if you should need to do so Appendix...

Page 12: ...for the Router Appendix I Warranty Information This appendix supplies the warranty information for the Router Appendix J Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix K Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 13: ...s that you assign manually to a PC or other device on the network Since a static IP address remains valid until you disable it static IP addressing ensures that the device assigned it will always have that same IP address until you change it Static IP addresses are commonly used with network devices such as server PCs or print servers If you use the Router to share your cable or DSL Internet conne...

Page 14: ...your local network when e mails are sent to their destination or when you have to connect to your company s network when you are out on the road How is your data protected That is when a VPN can help VPNs are called Virtual Private Networks because they secure data moving outside of your network as if it were still within that network When data is sent out across the Internet from your computer it...

Page 15: ...ferent servers around the world before reaching its final destination That s a long way to go for unsecured data and this is when a VPN serves its purpose What is a VPN A VPN or Virtual Private Network is a connection between two endpoints a VPN Router for instance in different networks that allows private data to be sent securely over a shared or public network such as the Internet This establish...

Page 16: ...ings When he connects to his office s router the two routers create a VPN tunnel encrypting and decrypting data As VPNs utilize the Internet distance is not a factor Using the VPN the telecommuter now has a secure connection to the central office s network as if he were physically connected Computer using VPN client software that supports IPSec to VPN Router The following is an example of a comput...

Page 17: ...nternet LED lights up when the Router is connected to your cable or DSL modem DMZ Internet Green The DMZ Internet LED lights up when the Router is connected to your cable or DSL modem when used as an Internet port and it lights up when the Router is connected to the hub switch or public server when used as a DMZ port DMZ Mode Green The DMZ Mode LED lights up when the Router is using DMZ mode 1 4 L...

Page 18: ...s with the Router and have tried all other troubleshooting measures press and hold in the Reset button for 30 seconds This will restore the factory defaults and clear all of the Router s settings such as port forwarding or a new password Ports 1 4 LAN These four LAN Ethernet ports connect to network devices such as PCs print servers or additional switches Internet WAN1 The Internet port connects t...

Page 19: ...f the Router Power The Power port is where you will connect the included AC power cable The security slot is located on the left side panel Security Slot The security slot is where you can attach a lock so the Router will be protected from theft Proceed to Chapter 4 Connecting the Router Figure 3 3 Right Side Panel Figure 3 4 Left Side Panel ...

Page 20: ... changed the default setting then you will not need to configure your PCs Set up and configure the Router with the setting s provided by your Internet Service Provider ISP according to Chapter 6 Set up and Configure the Router The installation technician from your ISP should have left the setup information with you after installing your broadband connection If not you can call your ISP to request ...

Page 21: ... 4 2 Connect the other end to an Ethernet port on a network device e g a PC print server hub or switch Repeat this step to connect more PCs or other network devices to the Router 3 Connect your cable or DSL modem s Ethernet cable to the Router s Internet port If using the DMZ Internet port connect a second cable to it and the other end to the network device e g modem or public server 4 Power on th...

Page 22: ... of the Router as shown in Figure 4 5 and then plug the power adapter into an electrical outlet The System LED on the front panel will light up as soon as the power adapter is connected properly If you need to configure your PCs proceed to Chapter 5 Configuring the PCs Otherwise proceed to Chapter 6 Set Up and Configure the Router Figure 4 5 Connect the Power ...

Page 23: ...s proceed to Chapter 6 Set Up and Configure the Router Configuring Windows 98 and Millennium PCs 1 Click the Start button Click Settings and then Control Panel From there double click the Network icon 2 On the Configuration tab select the TCP IP line for the applicable Ethernet adapter as shown in Figure 5 1 Do not choose a TCP IP entry whose name mentions Dial Up Adapter PPPoE VPN or AOL If the w...

Page 24: ...roperties button 3 Select Internet Protocol TCP IP and click the Properties button See Figure 5 3 4 Select Obtain an IP address automatically see Figure 5 4 Once the new windows appears click the OK button Click the OK button again to complete the PC configuration 5 Restart your computer Go to Chapter 6 Set Up and Configure the Router Configuring Windows XP PCs The following instructions assume yo...

Page 25: ... an IP address automatically see Figure 5 6 Once the new window appears click the OK button Click the OK button again or the Close button if any settings were changed to complete the PC configuration 5 Restart your computer Go to Chapter 6 Set Up and Configure the Router Figure 5 5 Internet Protocol TCP IP for Windows XP Figure 5 6 Obtain an IP address automatically for Windows XP ...

Page 26: ...on this screen Password You can change the Router s password on this screen it is strongly recommended that you change the Router s password from the default Time Change the time on this screen DMZ Host The DMZ Demilitarized Zone Host feature allows one local user to be exposed to the Internet to use a special purpose service such as Internet gaming or video conferencing Forwarding Port forwarding...

Page 27: ...rk Management Protocol is a network protocol that provides network administrators with the ability to monitor the status of the Router and receive notification of any critical events as they occur on the network Diagnostic The Router has two built in tools that will help with troubleshooting network problems Factory Default The Factory Default button can be used to clear all of your configuration ...

Page 28: ...unnel Status and GroupVPN Status Gateway to Gateway By setting this page users can add a new tunnel between two VPN devices Client to Gateway By setting this page you can create a new tunnel between a Local VPN device and a mobile user VPN Pass Through This tab allows you to disable IPSec Pass Through PPTP Pass Through and L2TP Pass Through Log Tab System Log The System Log displays Syslog E mail ...

Page 29: ...ton with underline it will hyperlink to related setup pages On the right side of the screen and all other screens in the Utility will be a link to the Site Map which has links to all of the Utility s tabs Click the Site Map button to view the Site Map See Figure 6 4 Then click on desired tab subject System Information Serial Number The serial number of the Router Firmware version The current versi...

Page 30: ...perlinks to WAN Connection type section on the Network page of the Setup Tab When users select Obtain an IP automatically it shows two buttons Release and Renew Users can click the Release button to release the IP that users already have and click the Renew button to update the DHCP Lease Time or get a new IP When users select PPPoE or PPTP it shows Connect Disconnect WAN2 DMZ IP It shows the curr...

Page 31: ...er of users If GroupVPN is disabled it will show No Group VPN was defined Log Setting Status It hyperlinks to the System Log page of Log Tab If you have not set up the mail server in Log Tab it shows E mail cannot be sent because you have not specified an outbound SMTP server address If you have set up the mail server but the log has not come out due to Log Queue Length and Log Time Threshold sett...

Page 32: ... DMZ Setting first DMZ In order to allow such services the Router comes with a special DMZ port which is used for setting up public servers The DMZ port sits between the local network ports and the Internet port Servers on the DMZ are publicly accessible but they are protected from attacks such as SYN Flooding and Ping of Death Use of the DMZ port is optional it may be left unconnected Using the D...

Page 33: ...er your User Name and Password 2 If you select Connect on Demand option the PPPoE connection will be disconnected if it has been idle for a period longer than the Max Idle Time setting 3 If you select Keep Alive option the Router will keep the connection alive by sending out a few data packets at the Redial Period so your Internet service thinks that the connection is still active PPTP Point to Po...

Page 34: ... Password Enter a new password for the Router Your password must be less than 15 characters long and it can t contain any spaces Confirm New Password Re enter the password for confirmation Click the Save Settings button to save the Password settings or click the Cancel Changes button to undo the changes Setup Tab Time Time The Router uses the time settings to time stamp log events to automatically...

Page 35: ...from outside users will be forwarded to 192 168 1 2 See Figure 6 13 You may use this function to establish a Web server or FTP server via an IP Gateway Be sure that you enter a valid IP Address You may need to establish a static IP address in order to properly run an Internet server For added security Internet users will be able to communicate with the server but they will not actually be connecte...

Page 36: ...pull down menu 2 If the Service you need is not listed in menu please click the Service Management button to add the new Service Name and enter the Protocol and Port Range Click the Add to List button Then click the Save Setting button Click the Exit button 3 Enter the Name or IP Address of the server that you want the Internet users to access Then enable the entry Click the Add to List button and...

Page 37: ...he Public Range Begin field This address will be assigned by the ISP The Router s WAN IP NAT Public Address cannot be included in the range Range Length Enter the number of IP addresses for the range The range length may not exceed the number of valid IP address Up to 64 ranges may be added To map a single address use a Range Length of 1 Note One to One NAT will change the way the firewall functio...

Page 38: ... adjust to physical changes in the network s layout The Router uses the dynamic RIP protocol It determines the route that the network packets take based on the fewest number of hops between the source and the destination The RIP protocol regularly broadcasts routing information to other routers on the network See Figure 6 19 Working Mode Select Gateway mode if your Router is hosting your network s...

Page 39: ...ry 1 Destination IP Enter the network address of the remote LAN segment For a standard Class C IP domain the network address is the first three fields of the Destination LAN IP while the last field should be zero 2 Subnet Mask Enter the Subnet Mask used on the destination LAN IP domain For Class C IP domains the Subnet Mask is 255 255 255 0 3 Default Gateway If this Router is used to connect your ...

Page 40: ...mputer DHCP client requests one The range is 5 43 200 Minutes Range Start End Enter a starting IP address and ending IP address to make a range to assign dynamic IPs The default range is 100 149 WINS Windows Internet Naming Service WINS is a service that resolves NetBIOS names to IP addresses The WINS is assigned if the computer DHCP client requests one If you do not know the WINS leave it as 0 Cl...

Page 41: ...pstream downstream upstream or downstream bandwidth is excessive 30 40 50 60 70 80 90 bring up the second link When there is an inactivity time out None 10min 20min 30min 40min 50min 60min the second link will be terminated Click the Save Settings button to save the Dual WAN Load Balance settings or click the Cancel Changes button to undo the changes System Management Tab SNMP SNMP or Simple Netwo...

Page 42: ...anagement Tab Diagnostic The Router has two built in tools that will help with troubleshooting network problems DNS Name Lookup The Internet has a service called the Domain Name Service DNS which allows users to enter an easily remembered host name such as www RV042 com instead of numerical TCP IP addresses to access Internet resources The Router has a DNS lookup tool that will return the numerica...

Page 43: ...rip Time Minimum Maximum and Average Note Ping requires an IP address The Router s DNS Name Lookup tool may be used to find the IP address of a host System Management Tab Factory Default The Factory Default button can be used to clear all of your configuration information and restore the Router to its factory default settings Only use this feature if you wish to discard all other configuration pre...

Page 44: ...rmware Upgrade instructions above System Management Tab Restart The recommended method of restarting your Router is to use this Restart tool Restarting with this button will send out your log file before the box is reset Click the Restart Router button to restart the Router See Figure 6 31 System Management Tab Setting Backup This tab allows you to make a backup file of your Preferences file for t...

Page 45: ...on to maintain connection information that passes through the firewall It will inspect all packets based on the established connection prior to passing the packets for processing through a higher protocol layer DoS Denial of Service Protect internal networks from Internet attacks such as SYN Flooding Smurf LAND Ping of Death IP Spoofing and reassembly attacks Block WAN Request This feature is desi...

Page 46: ...ules cannot override these four rules Besides the Default Rules all configured Network Access Rules are listed in the table and you can choose the Priority for each custom rule HTTP service from LAN side to RV042 is always allowed DHCP service from LAN side is always allowed DNS service from LAN side is always allowed Ping service from LAN side to RV042 is always allowed Click the Edit button to E...

Page 47: ...stination IP Select Any Single or Range and enter IP Address for single and range Scheduling Apply this rule time parameter Select the time range and the day of the week for this rule to be enforced The default condition for any new rule is to always enforce Firewall Tab Content Filter Forbidden Domains When the Block Forbidden Domains check box is selected the Router will forbid web access to sit...

Page 48: ...nel Status Add New Tunnel Click the Add New Tunnel button to add a Gateway to Gateway tunnel or add a Client to Gateway tunnel See Figure 43 Choose a Mode Gateway to Gateway Figure 42 shows the Gateway to Gateway tunnel which is a tunnel created between two VPN Routers Click the Add Now button to see the Gateway to Gateway screen Figure 44 Client to Gateway Figure 43 shows the Client to Gateway tu...

Page 49: ... Gateway Tunnel Test Click the Connect button to verify the tunnel status The test result will be updated in Status If the tunnel is connected a Disconnect button will be available so you can disconnect the VPN connection Configure Edit and Delete Click the Edit button to link to the original setup page where you can change the settings If you click the Edit button all of your tunnel settings will...

Page 50: ...this page users can add a new tunnel between two VPN devices See Figure 46 Tunnel No The tunnel number will be generated automatically from 1 30 Tunnel Name Enter the Tunnel Name such as LA Office Branch Site Corporate Site etc This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel Interface You can select the Interface from the pu...

Page 51: ...ynamic IP select this type When the Remote Security Gateway requests to create a tunnel with the Router the RV042 will work as a responder If you select this type just enter the E mail address for Authentication Local Security Group Type Select the local LAN user s behind the router that can use this VPN tunnel Local Security Group Type may be a single IP address a Subnet or an IP range The Local ...

Page 52: ... the RV042 will work as a responder If you select this type just enter the Domain Name for Authentication and the Domain Name must be the same as the Local Gateway of the remote VPN device The same Domain Name can be used only for one tunnel connection and users can t use the same Domain Name to create a new tunnel connection Dynamic IP E mail Addr USER FQDN Authentication If you select this type ...

Page 53: ...n 3DES is recommended because it is more secure and both sides must use the same Encryption method Authentication There are two methods of authentication MD5 and SHA The Authentication method determines a method to authenticate the ESP packets MD5 is a one way hashing algorithm that produces a 128 bit digest SHA is a one way hashing algorithm that produces a 160 bit digest SHA is recommended becau...

Page 54: ...se 1 SA Life Time This field allows you to configure the length of time a VPN tunnel is active in Phase 1 The default value is 28 800 seconds Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will generate a new key material for IP traffic encryption and authentication If PFS is enabled a hacker using brute force to break encryption keys is not able to obtain other or future IPSec ...

Page 55: ...de Aggressive Mode requires half of the main mode messages to be exchanged in Phase 1 of the SA exchange If network security is preferred select Main mode When users select the Dynamic IP in Remote Security Gateway Type it will be limited as Aggressive Mode Compress Support IP Payload compression Protocol IP Comp The Router supports IP Payload Compression Protocol IP Payload Compression is a proto...

Page 56: ...ically from 1 30 See Figure 6 45 Tunnel Name Once the tunnel is enabled enter the Tunnel Name field such as Sales Name This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel Interface Select the Interface from the pull down menu When dual WAN is enable there will be two options WAN1 and WAN2 Enable Check the box to enable VPN Group...

Page 57: ...r the Domain Name for Authentication the Domain Name must be same as the Remote Security Gateway of the remote VPN device The same Domain Name can be used only for one tunnel connection and users can t use the same Domain Name to create a new tunnel connection Dynamic IP E mail Addr USER FQDN Authentication If the Local Security Gateway has a dynamic IP select this type When the Remote Security Ga...

Page 58: ...ess of the client user with VPN software that supports IPSec at the other end of the tunnel Dynamic IP Domain Name FQDN Authentication If you select this type the Remote Security Gateway will be a dynamic IP so you don t need to enter the IP address When the Remote Security Gateway requests to create a tunnel with the RV042 the RV042 will work as a responder If you select this type just enter the ...

Page 59: ...d to encrypt decrypt ESP packets DES is 56 bit encryption and 3DES is 168 bit encryption 3DES is recommended because it is more secure and both sides must use the same Encryption method Authentication There are two methods of authentication MD5 and SHA The Authentication method determines a method to authenticate the ESP packets MD5 is a one way hashing algorithm that produces a 128 bit digest SHA...

Page 60: ... 160 bit digest SHA is recommended because it is more secure and both sides must use the same Authentication method Phase 1 SA Life Time This field allows you to configure the length of time a VPN tunnel is active in Phase 1 The default value is 28 800 seconds Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will generate a new key material for IP traffic encryption and authentica...

Page 61: ...mmended to select Null to disable authenticating ESP packets in Phase 2 but both sides of the tunnel must use the same setting Phase 2 SA Life Time This field allows you to configure the length of time a VPN tunnel is active The default value is 3 600 seconds Preshared Key Character and hexadecimal values are acceptable in this field e g My_ 123 or 4d795f40313233 The max entry of this field is 30 ...

Page 62: ... of IP datagrams If Compress is enabled the Router will propose compression when initiating a connection If the responders reject this propose the Router will not implement the compression When the Router works as a responder the Router will always accept compression even without enabling compression Keep Alive This mechanism helps to keep up the connection of IPSec tunnels Whenever a connection i...

Page 63: ...tton when you finish the VPN Pass Through settings or click the Cancel Changes button to undo the changes Log Tab System Log System Log There are three parts in System Log Syslog E mail and Log Setting See Figure 50 Syslog Enable Syslog If you check the box Syslog will be enabled Syslog Server In addition to the standard event log the Router can send a detailed log to an external Syslog server Sys...

Page 64: ...Click the E mail Log Now button to immediately send the log to the address in the Send E mail to field Log Setting Alert Log You can receive alert logs for the following events Check the box for the desired event Syn Flooding IP Spoofing Win Nuke Ping of Death and Unauthorized Login Attempt General Log You can receive alert logs for the following events Check the box for the desired event System E...

Page 65: ...eived and Dropped Packets Received for LAN WAN1 and WAN2 See Figure 6 51 Wizard Tab Use this tab to access two Setup Wizards the Basic Setup Wizard and the Access Rule Setup Wizard They will help you to set up the Router to access the Internet and set up a Firewall security policy The wizard will guide you through a series of menus to configure your Router See Figure 6 50 Basic Setup 1 Click the L...

Page 66: ...t and domain name If your ISP requires them enter the Host Name in the field and the Domain Name in the field Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 4 The next screen Figure 6 53 is for selecting the WAN or Internet Connection Type for your WAN1 Internet port Select Obtain an IP automatically Static IP or PPPoE d...

Page 67: ... want to return to the previous screen Click Exit if you want to exit the wizard If you chose Static IP Figure 6 55 appears Enter the Static IP Subnet Mask and Default Gateway provided by your ISP Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard If you chose PPPoE Figure 6 56 appears Enter the User Name and Password provid...

Page 68: ...u want to return to the previous screen Click Exit if you want to exit the wizard 7 The next screen that appears depends on your WAN or Internet Connection Type selection for your WAN2 port If you chose Obtain an IP automatically Figure 6 58 appears Select Use DNS Server provided by ISP default or Use the Following DNS Server Addresses if you want to enter a specific IP Click Next to continue Clic...

Page 69: ... if you want to return to the previous screen Click Exit if you want to exit the wizard If you chose PPPoE Figure 6 60 appears Enter the User Name and Password provided by your ISP Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 8 The final screen that appears is Figure 6 61 If you don t need to make any changes click Sav...

Page 70: ...3 The next screen to appear is shown in Figure 6 63 Select Allow or Deny for the action Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 4 The next screen to appear is shown in Figure 6 64 Select the service from the drop down menu that will be allowed or denied from the Service menu Click Next to continue Click Previous i...

Page 71: ...6 Select the Source from the Ethernet drop down menu Then select the users from the drop down menu Any single or Range Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 7 The next screen to appear is Figure 6 67 Select the destination either Any Single or Range from the drop down menu Click Next to continue Click Previous i...

Page 72: ...ek Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 9 The final screen that appears is Figure 6 69 If you don t need to make any changes click Save Settings Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard The screen in Figure 6 70 will appear when the settings are corre...

Page 73: ...click Downloads for this Product Click User Guide Linksys Web Site Click the Linksys Web Site button and it will link to the Support page of the Linksys Web Site www linksys com Logout Tab The Logout tab is located on the upper left corner of the Web Interface Clicking this tab will terminate the management session After you click the Logout tab you will be asked to confirm that you want to termin...

Page 74: ...CP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Ethernet adapter Highlight it and click the Properties button C In the TCP IP properties window select the IP address tab and select Specify an IP address Enter a unique IP address that is not used by any other computer on the network connected to ...

Page 75: ...d For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 A Click Start and Control Panel B Click the Network and Internet Connections icon and then the Network Connections icon C Right click the Local Ar...

Page 76: ...ection Properties window 5 Restart the computer if asked 6 Click the OK button in the Internet Protocol TCP IP Properties window and click the OK button in the Local Area Connection Properties window 7 Restart the computer if asked For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus ...

Page 77: ... a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 3 I am not getting an IP address on the Internet with my Internet connection A Refer to Problem 2 I want to test my Internet connection to verify that you have connectivity B If you need to register the MAC address of your Ethernet adapter with your IS...

Page 78: ...imitations due to occasional incompatibility with the NAT standard Change the IP address for the Router to another subnet to avoid a conflict between the VPN IP address and your local IP address For example if your VPN server assigns an IP address 192 168 1 X X is a number from 1 to 254 and your local LAN IP address is 192 168 1 X X is the same number used in the VPN IP address the Router will hav...

Page 79: ...many entries as you like When you have completed the configuration click the Save Settings button 7 I need to set up online game hosting or use other Internet applications If you want to play online games or use Internet applications most will work without doing any port forwarding or DMZ hosting There may be cases when you want to host an online game or Internet application This would require you...

Page 80: ...sable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the forwarding settings If the port number that the data enters from does not have port forwarding then the Router will send the data to whichever PC or network device you set for DMZ hosting Follow these ste...

Page 81: ... gain access Please follow these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the LAN For Microsoft Internet Explorer 5 0 or higher A Click Start Settings and Control Panel Double click Internet Options B Click the Connections tab C Click the LAN settings button and remove anything that is checked D Click the OK button to g...

Page 82: ...em 1 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 C Perform the upgrade using the TFTP utility If the firmware upgrade failed the Router will still work using its current firmware If you want to use a backup firmware version go to System Management Restart Select Backup F...

Page 83: ...ettings button to continue If your difficulties continue change the Size to different values Try this list of values one value at a time in this order until your problem is solved 1462 1400 1362 1300 16 I need to use port triggering Port triggering looks at the outgoing port services used and will trigger the Router to open a specific port depending on which port an Internet application uses Follo...

Page 84: ...ns What is the maximum number of IP addresses that the Router will support The Router will support up to 253 IP addresses Is IPSec Passthrough supported by the Router Yes enable or disable IPSec Passthrough on the VPN VPN Pass Through tab Where is the Router installed on the network In a typical environment the Router is installed between the cable DSL modem and the LAN Plug the Router into the ca...

Page 85: ... Can multiple gamers on the LAN get on one game server and play simultaneously with just one public IP address It depends on which network game or what kind of game server you are using For example Unreal Tournament supports multi login with one public IP How do I get Half Life Team Fortress to work with the Router The default client port for Half Life is 27005 The computers on your LAN need to ha...

Page 86: ...uration screen for the Router What can I do You may have to remove the proxy settings on your Internet browser e g Netscape Navigator or Internet Explorer Or remove the dial up settings on your browser Check with your browser documentation and make sure that your browser is set to connect directly and that any dial up is disabled Make sure that your browser is set to connect directly and that any ...

Page 87: ...e Router is compatible with virtually any cable or DSL modem that supports Ethernet What is the maximum number of VPN sessions allowed by the Router The maximum number depends on many factors At least one IPSec session will work through the Router however simultaneous IPSec sessions may be possible depending on the specifics of your VPNs How can I check whether I have static or DHCP IP addresses A...

Page 88: ...e Linksys website www linksys com or click the Firmware Download from Linksys Web Site button Select the Router from the pull down menu and choose the firmware from the options 2 Extract the file on your computer 3 Click the System Management Tab and then the Firmware Upgrade page 4 On the Firmware Upgrade screen shown in Figure B 1 enter the location of the extracted firmware upgrade file or clic...

Page 89: ...s the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure C 1 3 Write down the Adapter Address as shown on your computer screen see Figure C 2 This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is...

Page 90: ... address cloning or MAC filtering The example in Figure C 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC address cloning enter the MAC Address in the User Defined WAN1 or WAN2 MAC Address field or select MAC Address from this PC See Figure C 4 Click Save Settings to save the MAC Cloning settings or cl...

Page 91: ...er including the installation of the mounting brackets Setting up the Router You can set the Router on a desktop or mount it on the wall Placement of the Router Set the Router on a desktop or other flat secure surface Do not place excessive weight on top of the Router that could damage the Router If you want to wall mount the Router see Figure D 1 Figure D 1 Wall Mounting the Router ...

Page 92: ... instructions or protocol all PCs follow to communicate over a wired or wireless network Your PCs will not be able to utilize networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folders or files over your network Windows Help provides complete instructions on utilizing shared resources Network Neighb...

Page 93: ...work Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data...

Page 94: ...ing of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of t...

Page 95: ...ieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a networ...

Page 96: ...a Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mIRC An Internet Relay Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local ar...

Page 97: ...ed as a type of broadband connection in Europe Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to anoth...

Page 98: ...t TCP Transmission Control Protocol A network protocol for transmitting data that requires acknowledgement from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol t...

Page 99: ...Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protocol using TKIP T...

Page 100: ...t DMZ Internet DMZ Mode Diag 1 4 UPnP able cert Yes Security Features SPI Firewall DES and 3DES Encryption for IPSec VPN Tunnel Dimensions 5 12 x 1 52 x 7 87 W x H x D 130 mm x 38 5 mm x 200 mm Unit Weight 20 oz 0 58 kg Power Input 120V 60Hz Output 12V DC 1A Certifications FCC Class B CE Class B Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 0ºC to 70ºC 32ºF to 158ºF Operating Humidity 10 t...

Page 101: ...AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b h...

Page 102: ...g the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equip...

Page 103: ...king with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department fo...

Reviews: