background image

USER GUIDE

BUSINESS SERIES

10/100 16-Port  

VPN Router

Model:

 RV016

Содержание Linksys RV016

Страница 1: ...USER GUIDE BUSINESS SERIES 10 100 16 Port VPN Router Model RV016 ...

Страница 2: ...Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Security www linksys com security Copyright a...

Страница 3: ...tion 4 Horizontal Placement 4 Wall Mount Placement 4 Rack Mount Placement 5 Cable Connections 5 Chapter 4 Advanced Configuration 7 Overview 7 How to Access the Web Based Utility 7 System Summary 7 System Information 8 Configuration 8 Port Statistics 8 Network Setting Status 9 Firewall Setting Status 9 VPN Setting Status 9 Log Setting Status 9 Setup Network 10 Network 10 Setup Password 14 Password ...

Страница 4: ...c 29 Diagnostic 29 System Management Factory Default 30 Factory Default 30 System Management Firmware Upgrade 30 Firmware Upgrade 30 Restart 31 System Management Setting Backup 31 Import Configuration File 31 Export Configuration File 31 Port Management Port Setup 31 Basic Per Port Config 32 Port Management Port Status 32 Port Status 32 Firewall General 33 General 33 Firewall Access Rules 34 Acces...

Страница 5: ... 2000 XP orVista 62 Introduction 62 Computer using VPN client software to VPN Router 62 Linksys QuickVPN Instructions 62 Router Configuration 62 Export a Client Certificate from the Router 62 Add VPN Client Users 63 Linksys QuickVPN Client Installation and Configuration 63 Install from the CD ROM 63 Download from the Internet 64 Install the Client Certificate 64 Use of the Linksys QuickVPN Softwar...

Страница 6: ...Router B 72 Configuration of Scenario 2 73 Configuration of the One to One NAT Rules 73 Configuration of Router B 74 Configuration of Router A 74 Appendix E Bandwidth Management 76 Overview 76 Creation of New Services 76 Creation of New Bandwidth Management Rules 77 Appendix F Firmware Upgrade 78 Overview 78 How to Access the Web Based Utility 78 Upgrade the Firmware 78 Alternative Firmware Upgrad...

Страница 7: ...le 2 89 GNU GENERAL PUBLIC LICENSE 89 END OF SCHEDULE 2 92 Schedule 3 92 GNU LESSER GENERAL PUBLIC LICENSE 93 END OF SCHEDULE 3 97 Schedule 4 97 OpenSSL License 98 Original SSLeay License 98 END OF SCHEDULE 4 99 Appendix K Regulatory Information 100 FCC Statement 100 Safety Notices 100 Battery Recycling Statement 100 Industry Canada Statement 100 Avis d Industrie Canada 100 User Information for Co...

Страница 8: ...een the two networks Virtual Private Networking was created as a cost effective alternative to using a private dedicated leased line for a private network It can be used to create secure networks linking a central office with branch offices telecommuters and or professionals on the road There are two basic ways to create a VPN connection VPN Router to VPN Router computer using VPN client software ...

Страница 9: ...PN client software that is configured with her office s VPN settings She accesses the VPN client software and connects to the VPN Router at the central office As VPNs use the Internet distance is not a factor Using theVPN the businesswoman now has a secure connection to the central office s network as if she were physically connected Internet Central Office Off Site Notebook with VPN Client Softwa...

Страница 10: ...LED lights up when the Router is connected to a DMZ host through the DMZ port The LED flashes to indicate network activity over the DMZ port 1 13 LAN These Ethernet ports connect the Router to wired computers and other Ethernet network devices LAN ports 9 13 can also be used as Internet ports Internet 1 7 These Ethernet ports connect the Router to Internet devices such as cable or DSL modems Inter...

Страница 11: ... two slots is 94 mm 3 70 inches Two screws are needed to mount the Router Suggested Mounting Hardware 3 3 8 mm 5 6 mm 1 6 2 mm Note Mounting hardware illustrations are not true to scale NOTE Linksys is not responsible for damages incurred by insecure wall mounting hardware Follow these instructions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry an...

Страница 12: ...should be maintained Particular attention should be given to supply connections other than direct connections to the branch circuit e g use of power strips To rack mount the Router in any standard 19 inch rack follow these instructions Place the Router on a hard flat surface with the front 1 panel faced towards your front side Attach a rack mount bracket to one side of the Router 2 with the suppli...

Страница 13: ...the DMZ port Connect the other end to an appropriate network device such as a public server Connect to DMZ Port Power on the cable or DSL modem s If you have a 5 network device connected to the DMZ port power on that network device Connect the included power cord to the Router s 6 Power port and then plug the power cord into an electrical outlet Connect the Power The System LED on the front panel ...

Страница 14: ...e Management feature on the Firewall General screen has been enabled then users with administrative privileges can remotely access the web based utility Use http WAN IP address of the Router or use https WAN IP address of the Router if you have enabled the HTTPS feature A login screen prompts you for your User name and 2 Password Enter admin in the User name field and enter admin in the Password f...

Страница 15: ...ptional service Refer to Appendix F Firmware Upgrade for instructions Go buy To purchase a license to use this service click Go buy YouwillberedirectedtoalistofLinksysresellersonthe Linksys website Then follow the on screen instructions Register If you already have a license click Register You will be redirected to the Trend Micro ProtectLink Gateway website Then follow the on screen instructions ...

Страница 16: ...It shows the Router s Working Mode Gateway or Router and it hyperlinks to the Dynamic Routing section on the Setup Advanced Routing screen DNS It shows all DNS server IP addresses and hyperlinks to the WAN Connection Type settings on the Setup Network screen Bandwidth Management It shows the Bandwidth Management settings of the Router s WAN port s and hyperlinks to the System Management Bandwidth ...

Страница 17: ...e setup information is provided by your ISP Setup Network Network Host Name and Domain Name Enter a host and domain name for the Router Some ISPs require these names as identification You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name In most cases you can leave these fields blank LAN Setting The LAN MAC address of the Rout...

Страница 18: ...roadband connections to the Router however you can set up as many as seven broadband connections From the drop down menu select how many WAN ports you want to use The default is 2 You can also change the number of WAN ports using the Port Management Port Setup screen Make sure the physical network configuration matches the number of WAN port settings on this screen If you change the number of WAN ...

Страница 19: ... subnet mask of the Router Default Gateway Address Enter the IP address of the default gateway DNS Server Required 1 2 Enter at least one DNS server IP address Multiple DNS server IP settings are common In most cases the first available DNS entry is used MTU The Maximum Transmission Unit MTU setting specifies the largest packet size permitted for network transmission In most cases keep the default...

Страница 20: ...ult Max Idle Time is 5 minutes Keep Alive If you select the Keep Alive option the Router will keep the connection alive by sending out a few data packetsperiodically soyourISPthinksthattheconnection is still active This option keeps your connection active indefinitely even when it sits idle The default Redial Period is 30 seconds MTU The Maximum Transmission Unit MTU setting specifies the largest ...

Страница 21: ... Password The Router s default User Name and Password is admin and Linksys strongly recommends that you change the Router s password from the default to a unique password NOTE The password cannot be recovered if it is lost or forgotten If the password is lost or forgotten you have to reset the Router to its factory default settings this will remove all of your configuration changes Setup Password ...

Страница 22: ...ort range forwarding and port triggering applications Port range forwarding can be used to set up public services or other specialized Internet applications on your network while port triggering can be used to set up triggered ranges and forwarded ranges for Internet applications Setup Forwarding Forwarding Port Range Forwarding Port forwarding can be used to set up public services on your network...

Страница 23: ...uested data returns through the Router the data is pulled back to the proper computer by way of IP address and port mapping rules Some Internet applications or games use alternate ports to communicate between the server and LAN host When you want to use these applications enter the triggering outgoing port and alternate incoming port in the Port Triggering table Then the Router will forward the in...

Страница 24: ...u would like up to a maximum of 30 To delete an entry select it and click Delete selected application Click Show Tables to see the details of your entries The UPnP Forwarding Table List appears UPnP Forwarding Table List Click Refresh to update the on screen information Click Close to exit this screen and return to the UPnP screen On the UPnP screen click Save Settings to save your changes or clic...

Страница 25: ...ancel Changes to undo them Setup MAC Clone Some ISPs require that you register a MAC address which is a 12 digit code assigned to a unique piece of hardware for identification The MAC Clone feature clones your network adapter s MAC address onto the Router so you don t have to call your ISP to change the registered MAC address to the Router s MAC address Setup MAC Clone MAC Clone The MAC Clone tabl...

Страница 26: ...into the first field dyndns would go into the second field and org would go into the last field CustomDNS DynDNS orgoffersafreeaccountandapaid account which use different authentication methods If you have a paid account select this option to register the paid account with the DDNS server of DynDNS org Click Save Settings and the status of the DDNS function will be updated Internet IP Address The ...

Страница 27: ...ed Routing The Advanced Routing screen allows you to configure the dynamic and static routing settings Setup Advanced Routing Advanced Routing Dynamic Routing The Router s dynamic routing feature can be used so the Router will automatically adjust to physical changes in the network s layout Using the dynamic RIP protocol the Router calculates the most efficient route for the network s data packets...

Страница 28: ...te value maximum is 15 This indicates the number of nodes that a data packet passes through before reaching its destination A node is any device on the network such as a computer or router Interface Select the appropriate interface The Interface tells you whether your network is on the LAN or WAN If the gateway router is on a LAN port then select LAN If you are connecting to another network throug...

Страница 29: ...ist select Enable and then click Apply To add all IP addresses and MAC addresses to the Static IP list click Select All To update the on screen information click Refresh To exit this screen and return to the Setup screen click Close Static IP Address Enter the static IP address You can enter 0 0 0 0 if you want the Router to assign a static IP address to the device MAC Address Enter the MAC addres...

Страница 30: ...er of dynamic IP addresses available Total It shows the total number of dynamic IP addresses that can be assigned by the DHCP server ClientTable For all network clients using the DHCP server the Client Table shows the current DHCP Client information Client Host Name This is the name assigned to a client host IP Address It is the dynamic IP address assigned to a client MAC Address This indicates th...

Страница 31: ...detect the network connection status of the ISP if you have set up the DNS server in the Setup Network screen If you did not set up the DNS server the checkbox will be grayed out and then you cannot use the DNS lookup tool Network Service Detection Network Service Detection helps manage your connection and can report when your connection experiences problems To use this service select this option ...

Страница 32: ...lete selected application Click Save Settings to save your changes or click Cancel Changes to undo them On the Edit Load Balance screen click Save Settings to save your changes or click Cancel Changes to undo them Click Back to return to the Multi WAN screen without saving any changes Edit Load Balance IP Group After you clicked Edit configure the Load Balance settings for the selected WAN port Sy...

Страница 33: ...ck Exit to return to the Multi WAN screen If you want to modify a service you have created select it and click Update this service Make changes Click Save Settings to save your changes or click Cancel Changes to undo them Click Exit to return to the Multi WAN screen If you want to delete a service you have created select it and click Delete selected service Click Save Settings to save your changes...

Страница 34: ...Port Range Enter its range ClickAddtoList ClickSaveSettingstosaveyourchanges or click Cancel Changes to undo them Click Exit to return to the Bandwidth Management screen If you want to modify a service you have created select it and click Update this service Make changes Click Save Settings to save your changes or click Cancel Changes to undo them Click Exit to return to the Bandwidth Management s...

Страница 35: ...cted service Click Save Settings to save your changes or click Cancel Changes to undo them Click Exit to return to the Bandwidth Management screen Direction Select Upstream for outbound traffic or select Downstream for inbound traffic Priority Select High Middle or Low High priority services will share 30 of the total system bandwidth Middle priority services will share 60 of the total system band...

Страница 36: ...agnostic The Router has two built in tools DNS Name Lookup and Ping which are used for troubleshooting network problems The Internet has a service called the Domain Name Service DNS which allows users to enter an easily remembered host name such as www linksys com instead of numerical TCP IP addresses to access Internet resources The DNS NameLookuptoolwillreturnthenumericalTCP IPaddress of a host ...

Страница 37: ...e Factory Default Confirmation System Management Firmware Upgrade You can use this feature to upgrade the Router s firmware to the latest version System Management Firmware Upgrade Firmware Upgrade Todownloadthefirmware refertotheFirmwareDownload instructions If you have already downloaded the firmware onto your computer then click the Browse button to look for the extracted file Firmware Upgrade ...

Страница 38: ...outer To save the backup file you need to export the configuration file To use the backup preferences file you need to import the configuration file that you previously exported System Management Setting Backup Import Configuration File To import a configuration file first specify where your backup preferences file is located Click Browse and then select the appropriate configuration file Import A...

Страница 39: ...en you will not need to set up speed and duplex settings separately VLAN For each LAN port a VLAN a Virtual LAN or network within your network can be established Up to 13 VLANs can be established Click Save Settings to save your changes or click Cancel Changes to undo them Port Management Port Status Status information is displayed for the selected port Port Management Port Status Port ID To see t...

Страница 40: ... Management feature on the Firewall General screen has been enabled then users with administrative privileges can remotely access the web based utility Use http WAN IP address of the Router or use https WAN IP address of the Router if you have enabled the HTTPS feature HTTPS HTTPS is a secured HTTP session If Remote Management is enabled HTTPS is enabled by default NOTE If you disable the HTTPS fe...

Страница 41: ... always allowed Firewall Access Rules Access Rules Except for the default rules all configured access rules are listed in the Access Rules table and you can set the priority for each custom rule If the Access Rules table has multiple pages select a different page to view from the Jumpto drop down menu If you want more or fewer entries listed per page select a different number from the entries per ...

Страница 42: ...packets NOTE If the Deny Policies option is enabled on the Log System Log screen then the log will not include log events from the Deny access rules on the Firewall Access Rules screen Log events from the Deny access rules will be logged separately from Deny Policies if the option Log packets match this rule is selected If the Allow Policies option is enabled on the Log System Log screen then the ...

Страница 43: ...words Scheduling Decide when you want the content filters rules to be enforced To specify specific hours select from and enter the specific hours and minutes in 24 hour format Then select the appropriate days The default is to always enforce it Click Save Settings to save your changes or click Cancel Changes to undo them NOTE The content filter rules will be automatically disabled if the Trend Mic...

Страница 44: ...or the Keying Mode in the IPSec section then only the Encryption type and Authentication method will be displayed Local Group This shows the IP address and subnet mask of the Local Group Remote Group The IP address and subnet mask of the Remote Group are displayed here Remote Gateway It shows the IP address of the Remote Gateway Tunnel Test Click Connect to verify the status of the VPN tunnel The ...

Страница 45: ... how long the VPN connection existed To disconnect any VPN client select the VPN client in the Disconnect column and then click Disconnect VPN Gateway to Gateway Use this screen to create a new tunnel between two VPN devices VPN Gateway to Gateway Add a NewTunnel Tunnel No The tunnel number is automatically generated Tunnel Name Enter a name for this VPN tunnel such as Los Angeles Office Chicago B...

Страница 46: ...t match the Remote Security Gateway of the remote VPN device and can only be used for one tunnel connection Local Security Gateway Type Dynamic IP Domain Name FQDN Authentication DomainName Enterthedomainnameforauthentication Once used you cannot use it again to create a new tunnel connection Dynamic IP E mail Addr USER FQDN Authentication The Local Security Gateway will be a dynamic IP address so...

Страница 47: ...mote VPN device at the other end of the tunnel and then enter the IP address IP by DNS Resolved Select this option if you do not know the static IP address of the remote VPN device but you do know its domain name Then enter the remote VPN device s domain name on the Internet The Router will retrieve the IP address of the remoteVPN device via its public DNS records IP Domain Name FQDN Authenticatio...

Страница 48: ...ich selection you have made IP Only the computer with a specific IP address will be able to access the tunnel Remote Security Group Type IP IP address Enter the appropriate IP address Subnet ThedefaultisSubnet Allcomputersontheremotesubnet will be able to access the tunnel Remote Security Group Type Subnet IP address Enter the IP address Subnet Mask Enter the subnet mask The default is 255 255 255...

Страница 49: ...a 128 bit digest SHA is a one way hashing algorithm that produces a 160 bit digest SHA is recommended because it is more secure Both ends of the VPN tunnel must use the same Phase 2 Authentication setting Phase 2 SA Life Time Configure the length of time a VPN tunnel is active in Phase 2 The default is 3600 seconds Preshared Key This specifies the pre shared key used to authenticate the remote IKE...

Страница 50: ...if you wanttheRoutertoproposecompressionwhenitinitiatesa connection If the responders reject this proposal then the Router will not implement compression When the Router works as a responder it will always accept compression even if compression is not enabled Keep Alive Keep Alive helps maintain IPSec VPN tunnel connections If a connection is dropped and detected it will be re established immediat...

Страница 51: ...e other end of the tunnel Interface Select the appropriate WAN port Enable Check this box to enable a VPN tunnel Local Group Setup Local Security GatewayType Select the type you want to use IP Only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication Dynamic IP Domain Name FQDN Authentication or Dynamic IP E mail Addr USER FQDN Authentication Follow the instructions for the t...

Страница 52: ...or authentication Local Security GroupType Select the local LAN user s behind the Router that can use this VPN tunnel Select the type you want to use IP Subnet or IP Range Follow the instructions for the type you want to use NOTE The Local Security GroupType you select should match the Remote Security Group Type selected on the VPN device at the other end of the tunnel After you have selected the ...

Страница 53: ...NS Resolved Select this option if you do not know the static IP address of the remote computer but you do know its domain name Then enter the remote computer s domain name on the Internet The Router will retrieve the IP address of the remote VPN device via its public DNS records E mail address Enter the e mail address as an ID Dynamic IP Domain Name FQDN Authentication The Local Security Gateway w...

Страница 54: ...e host name and domain name for a specific computer on the Internet When the remote computer requests to create a tunnel with the Router the Router will work as a responder E mail Address UserFQDN Remote Client E mail Address UserFQDN E mail address Enter the e mail address of the user FQDN Microsoft XP 2000 VPN Client Dynamic IP users such as PPPoE or DHCP users who use the Microsoft VPN client s...

Страница 55: ... must use the same Phase 2 Encryption setting Phase 2 Authentication Select a method of authentication NULL MD5 or SHA The authentication method determines how the ESP packets are validated MD5 is a one way hashing algorithm that produces a 128 bit digest SHA is a one way hashing algorithm that produces a 160 bit digest SHA is recommended because it is more secure Both ends of the VPN tunnel must ...

Страница 56: ... IP datagrams Select this option if you wanttheRoutertoproposecompressionwhenitinitiatesa connection If the responders reject this proposal then the Router will not implement compression When the Router works as a responder it will always accept compression even if compression is not enabled Keep Alive Keep Alive helps maintain IPSec VPN tunnel connections If a connection is dropped and detected i...

Страница 57: ...or Admin By default the certificate file is named RV016_ MMDD _ HHMM pem which you can rename MMDD stands for month and day HHMM stands for hours and minutes Follow the on screen instructions to select the location where you want to store your certificate Export Certificate for Client The certificate for the client must be placed in the install directory of the QuickVPN client software To save the...

Страница 58: ...s The default is 192 168 1 200 Range End Enter the ending LAN IP address of the range allotted to PPTP VPN clients The default is 192 168 1 209 NOTE The LAN IP address range for PPTP VPN clients should be outside of the normal DHCP range of the Router Users Setting The Router uses this information to identify authorized PPTP VPN clients User Name Enter a name for the PPTP VPN client New Password E...

Страница 59: ...er the e mail address that will receive your log files If you do not want copies of the log information e mailed to you then leave this field blank Log Queue Length You can designate the length of the log that will be e mailed to you The default is 50 entries so unless you change this setting the Router will e mail the log to you when there are more than 50 log entries Log Time Threshold You can d...

Страница 60: ...vent is displayed Message The message associated with each log event is displayed To update a log click Refresh To clear a log click Clear To exit the System Log screen and return to the Log System Log screen click Close Outgoing LogTable To view the outgoing log information click this option Outgoing Log Table Time The time of each log event is displayed You can sort each log by time sequence Eve...

Страница 61: ...connection s Run the Access Rule Setup Wizard to set up the security policy for the Router Wizard Basic Setup To change the number of WAN ports proceed to the Change Number of WAN Ports section To change the Router s Internet connection settings proceed to the Edit Network Settings section Change Number ofWAN Ports Click 1 Launch Now to run the Basic Setup Wizard To change the number of WAN ports ...

Страница 62: ... select Edit Network Settings Click Next Edit Network Settings Your Internet Service Provider ISP may require you 3 to use a host and domain name for your Internet connection If your ISP requires them complete the Host Name and Domain Name fields otherwise leave these blank Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the Setup W...

Страница 63: ...t one Click Next to continue and proceed to step 6 Click Previous if you want to return to the previous screen Click Exit if you want to exit the Setup Wizard Obtain an IP Automatically Static IP Complete the Static IP Subnet Mask and Default Gateway fields with the settings provided by your ISP Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you wa...

Страница 64: ... access disconnects The default is 5 minutes If you select the Keep alive option the Router will keep the connection alive by sending out a few data packets periodically so your ISP thinks that the connection is still active This option keeps your connection active indefinitely even when it sits idle The default Redial Period is 30 seconds The default Keepalive Interval is 30 seconds The default K...

Страница 65: ...he Access Rule Setup Wizard This screen explains the Access Rules including the 2 Router s Default Rules Click Next to continue Click Exit if you want to exit the Setup Wizard Access Rules Policy From the drop down menu select 3 Allow or Deny depending on the intent of the Access Rule Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit ...

Страница 66: ... previous screen Click Exit if you want to exit the Setup Wizard Select the Source Select the Destination IP address es for this Access 7 Rule If it can be any IP address select Any If it is one IP address select Single and enter the IP address If it is a range of IP addresses select Range and enter the range of IP addresses Click Next to continue Click Previous if you want to return to the previo...

Страница 67: ...Firewall Access Rules screen will appear Support Access a variety of resources on the Support page of the Linksys website www linksys com You must have an active Internet connection before you can visit the Linksys website Support Manual If you want the latest version of this User Guide click On Line Manual The Support page of the Linksys website appears Followtheon screeninstructionstoaccesstheDo...

Страница 68: ... System LED should be green and not flashing If the System LED is flashing then power off all of your network devices including the modem Router and computers Then power on each device in the following order Cable or DSL modem 1 Router 2 Computer 3 Check the cable connections The computer should be connected to one of the ports numbered 1 4 on the Router and the modem must be connected to the Inte...

Страница 69: ...al Office Off Site Notebook with VPN Client Software VPN Router Computer to VPN Router Linksys QuickVPN Instructions This appendix has two sections The first section explains how to do the following for each QuickVPN client using the Router s web based utility Export a client certificate 1 Configure a user name and password 2 Add the QuickVPN client to the list 3 The second section explains how to...

Страница 70: ...LAN IP address is the default 192 168 1 1 then a pop up window will appear when you first save these settings You will be asked if you want the Router to automatically change its LAN IP address to prevent conflicting IP addresses To allow the Router to change its LAN IP address click Yes If there is an IP address conflict the QuickVPN client will not be able to connect to the Router Linksys QuickV...

Страница 71: ...nstalled on the computer License Agreement Copying Files Installation Complete Click 10 Finish to complete the installation Proceed to the section Install the Client Certificate Install the Client Certificate For each QuickVPN client save the client certificate to the directory where the QuickVPN program is installed Example C Program Files Linksys QuickVPN Client NOTE The certificate for the clie...

Страница 72: ...tus screen appears The screen displays the IP address of the remote end of the VPN tunnel the time and date theVPN tunnel began and the total length of time the VPN tunnel has been active QuickVPN Tray Icon Connection QuickVPN Status To terminate the VPN tunnel click Disconnect To change your password click Change Password For information click Help If you clicked Change Password and have permissi...

Страница 73: ...Sec VPN Tunnel Remote Gateway Using Static IP NOTE Each computer must have a network adapter installed Configuration of the RVL200 Follow these instructions for the first VPN Router designated RVL200 The other VPN Router is designated the RV016 Launch the web browser for a networked computer 1 designated PC 1 Access the web based utility of the RVL200 Refer to 2 the User Guide of the RVL200 for de...

Страница 74: ...dress B B B B of the RV016 will be automatically detected For the Local Security GroupType select Subnet Enter the RV016 s local network settings in the IPAddressand Subnet Mask fields RV016 VPN Settings For the Remote Security Gateway Type select 9 IP Only Enter the RVL200 s WAN IP address in the IP Address field For the Remote Security Group Type select 10 Subnet Enter the RVL200 s local network...

Страница 75: ...P Only The WAN IP address A A A A of the RVL200 will be automatically detected For the Local Security GroupType select Subnet Enter the RVL200 s local network settings in the IP Address and Subnet Mask fields RVL200 IPSec VPN Settings For the Remote Security Gateway Type select 8 IP Only Then select IP by DNS Resolved Enter the RV016 s domain name in the field provided For the Remote Security Grou...

Страница 76: ...d correctly Configuration when Both Gateways Use Dynamic IP Addresses ThisexampleassumesbothGatewaysareusingdynamicIP addresses If the Remote Gateway uses a static IP address refer to Configuration when the Remote Gateway Uses a Static IP Address If only the Remote Gateway uses a dynamic IP address refer to Configuration when the Remote Gateway Uses a Dynamic IP Address RVL200 Dynamic IP A A A A w...

Страница 77: ... to Gateway tab Enter a name in the 5 Tunnel Name field Select the appropriate Interface 6 WAN1 or WAN2 Select 7 Enable For the Local Security Gateway Type select 8 IP Only The WAN IP address B B B B of the RV016 will be automatically detected For the Local Security GroupType select Subnet Enter the RV016 s local network settings in the IPAddressand Subnet Mask fields RV016 VPN Settings For the Re...

Страница 78: ...PSec VPN Routers model number RVL200 one of which is connected to the Internet Two 10 100 16 Port VPN Routers model number RV016 one of which is connected to the Internet Configuration of Scenario 1 In this scenario Router A is the RVL200 Initiator while Router B is the RVL200 Responder 192 168 2 100 192 168 1 101 WAN 192 168 99 22 Router B RVL200 Responder LAN 192 168 2 0 24 WAN 192 168 99 11 NAT...

Страница 79: ...llow these instructions for Router B Launch the web browser for a networked computer 1 designated PC 2 Access the web based utility of Router B Refer to the 2 User Guide of the RVL200 for details Click the 3 IPSec VPN tab Click the 4 Gateway to Gateway tab Enter a name in the 5 Tunnel Name field For the VPN Tunnel setting select 6 Enable For the Local Security Gateway Type select 7 IP Only The WAN...

Страница 80: ... 168 11 101 Follow these instructions for the one to one NAT rule on NAT 1 RV016 Launch the web browser for a networked computer 1 Access the web based utility of NAT 1 RV016 Refer to 2 Chapter 4 Advanced Configuration for details Click the 3 Setup tab Configuration of Scenario 2 In this scenario Router B is the RVL200 Initiator while Router A is the RVL200 Responder Router B will have the Remote ...

Страница 81: ...ields For the Remote Security Gateway Type select 8 IP Only Enter 192 168 99 1 in the IP Address field Router B s IPSec VPN Settings For the Remote Security Group Type select 9 Subnet Enter Router A s local network settings in the IP Address and Subnet Mask fields In the IPSec Setup section select the appropriate 10 encryption authentication andotherkeymanagement settings In the 11 Preshared Key f...

Страница 82: ...etwork settings in the IP Address and Subnet Mask fields In the IPSec Setup section select the appropriate 10 encryption authentication andotherkeymanagement settings In the 11 Preshared Key field enter a string for this key for example 13572468 If you need more detailed settings click 12 Advanced Settings Otherwise click Save Settings ...

Страница 83: ...t System Management Bandwidth Management On the 5 Service Management screen enter a name such as Vonage VoIP in the Service Name field Add Vonage VoIP Service From the 6 Protocol drop down menu select the protocol the VoIP service uses For example some VoIP devices use UDP Enter its SIP port range in the 7 Port Range fields For example you can set the Port Range to 5060 to 5070 to make sure that a...

Страница 84: ...n the 12 Max Rate field enter the maximum rate for the maximum bandwidth For example you can set a maximum rate of 80 kbit sec Select 13 Enable to enable this rule After you have set up the rule click 14 Add to list Set up a rule for Vonage 2 Select 15 Vonage 2 from the Service drop down menu Enter the IP address or range you need to control To 16 include all internal IP addresses keep the default...

Страница 85: ...ent Firmware Upgrade The Support page of the Linksys website appears 4 Follow the on screen instructions to access the Downloads page for the 10 100 16 Port VPN Router model number RV016 Download the firmware upgrade file 5 Extract the file on your computer 6 In the Firmware Upgrade section of the 7 Firmware Upgrade screen click the Browse button to locate the extracted file After you have selecte...

Страница 86: ...tract exe 7 file to an appropriate location on your computer Double click the 8 exe file In the 9 Router IP field enter the IP address of the Router Firmware Upgrade Utility Login In the 10 Password field enter the password for access to the Router Click 11 Next and then follow the on screen instructions ...

Страница 87: ...address of the Router if you have enabled the HTTPS feature A login screen prompts you for your User name and 2 Password Enter admin in the User name field and enter admin in the Password field You can change the Password on the Setup Password screen Then click OK Login Screen How to Purchase Register or Activate the Service You can purchase register or activate the service using the System Summar...

Страница 88: ...o use this service click this link You will be redirected to a list of Linksys resellers on the Linksys website Then follow the on screen instructions I have purchased ProtectLink Gateway and want to register it If you already have a license click this link You will be redirected to the Trend Micro ProtectLink Gateway website Then follow the on screen instructions NOTE To have your e mail checked ...

Страница 89: ...e days keep the default All day 24 hours To specify hours select Specify business hours For morning hours select Morning and then select the appropriate From and To times For afternoon hours select Afternoon and then select the appropriate From and To times Web Reputation Select the appropriate security level High This level blocks a higher number of potentially malicious websites but also increas...

Страница 90: ...appropriate messages are forwarded to your network ProtectLink Email Protection Email Protection NOTE To have your e mail checked you will need to provide the domain name and IP address of your e mail server If you do not know this information contact your ISP https us imhs trendmicro com linksys To set up e mail protection click this link You will be redirected to theTrend Micro ProtectLink Gatew...

Страница 91: ...automatically displayed License expires on The date and time your license expires are displayed Renew To renew your license click Renew Then follow the on screen instructions Add Seats Each seat allows an e mail account to use Email Protection To add seats to your license click Add Seats Then follow the on screen instructions ...

Страница 92: ...P Server DHCP Client DNS DNS Proxy Dynamic DNS DynDNS 3322 PeanutHull NAT Many to One One to One DMZ DMZ Port DMZ Host Routing Static and RIP v1 v2 QoS Port based QoS Configurable per LAN Port Service based QoS Supports Rate Control or Priority Rate Control Upstream Downstream Bandwidth can be Configured per Service Priority Each Service can be Mapped to One of the 3 Priority Levels VPN IPSec 100 ...

Страница 93: ... Materials Authorization RMA number You are responsible for properly packaging and shipping your product to Linksys at your cost and risk You must include the RMA number and a copy of your dated proof of Appendix I Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period which begins on the date of pur...

Страница 94: ...ada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies includ...

Страница 95: ...ksys Software License Agreement THIS LICENSE AGREEMENT IS BETWEEN YOU AND CISCO LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHES...

Страница 96: ...a CD Linksys will mail to You a CD with such code for 9 99 plus the cost of shipping upon request Term and Termination You may terminate this License at any time by destroying all copies of the Software and documentation Your rights under this License will terminate immediately without notice from Linksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty term...

Страница 97: ...y by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYI...

Страница 98: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Страница 99: ...ised 9 and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms ...

Страница 100: ...ng it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone el...

Страница 101: ...d by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does You may copy and distri...

Страница 102: ...the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses t...

Страница 103: ...rms of the Sections above Give prominent notice with the combined library of b the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work You may not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or dist...

Страница 104: ...eptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NOWARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHE...

Страница 105: ...OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Net...

Страница 106: ...USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simp...

Страница 107: ...Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning WARNING This product contains lead known to the State of California to cause cancer and birth defects or ot...

Страница 108: ...rnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady ...

Страница 109: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Страница 110: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Страница 111: ...e zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje o...

Страница 112: ... Website http www linksys com Support Site http www linksys com support FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization http www linksys com warranty NOTE Details on warranty and RMA issues can be found in the Warranty section of this Guide 8062520NC JL ...

Отзывы: