background image

74

Software License  Agreement

4-Port Gigabit Security Router with VPN

Appendix I

Copyright (c) 1998-2007 The OpenSSL Project.  All rights 
reserved.

Redistribution  and  use  in  source  and  binary  forms,  with 
or without modification, are permitted provided that the 
following conditions are met:

1.  Redistributions  of  source  code  must  retain  the  above 
copyright notice, this list of conditions and the following 
disclaimer.

2.  Redistributions  in  binary  form  must  reproduce  the 
above  copyright  notice,  this  list  of  conditions  and  the 
following disclaimer in the documentation and/or other 
materials provided with the distribution.

3. All advertising materials mentioning features or use of 
this software must display the following acknowledgment:  
“This  product  includes  software  developed  by  the 
OpenSSL  Project  for  use  in  the  OpenSSL Toolkit.  (http://
www.openssl.org/)”

4.  The  names  “OpenSSL  Toolkit”  and  “OpenSSL  Project” 
must not be used to endorse or promote products derived 
from this software without prior written permission. For 
written permission, please contact openssl-core@openssl.
org.

5. Products derived from this software may not be called 
“OpenSSL”  nor  may  “OpenSSL”  appear  in  their  names 
without prior written permission of the OpenSSL Project.

6.  Redistributions  of  any  form  whatsoever  must  retain 
the  following  acknowledgment:   “This  product  includes 
software developed by the OpenSSL Project for use in the 
OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT 
``AS  IS’’  AND  ANY  EXPRESSED  OR  IMPLIED WARRANTIES, 
INCLUDING,  BUT  NOT  LIMITED  TO,  THE  IMPLIED 
WARRANTIES  OF  MERCHANTABILITY  AND  FITNESS  FOR 
A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT 
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE 
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
BUT  NOT  LIMITED  TO,  PROCUREMENT  OF  SUBSTITUTE 
GOODS  OR  SERVICES;  LOSS  OF  USE,  DATA,  OR  PROFITS; 
OR  BUSINESS  INTERRUPTION)  HOWEVER  CAUSED  AND 
ON  ANY THEORY  OF  LIABILITY, WHETHER  IN  CONTRACT, 
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 
OTHERWISE)  ARISING  IN  ANY  WAY  OUT  OF THE  USE  OF 
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
SUCH DAMAGE.

 =======================================

This product includes cryptographic software written by 
Eric  Young  ([email protected]).    This  product  includes 
software written by Tim Hudson ([email protected]).

 Original SSLeay License

 -----------------------

Copyright (C) 1995-1998 Eric Young ([email protected])

All rights reserved.

This  package  is  an  SSL  implementation  written  by  Eric 
Young ([email protected]).

The  implementation  was  written  so  as  to  conform  with 
Netscape’s SSL.

This  library  is  free  for  commercial  and  non-commercial 
use  as  long  as  the  following  conditions  are  adhered  to.  
The  following  conditions  apply  to  all  code  found  in  this 
distribution, be it the RC4, RSA, lhash, DES, etc., code; not 
just the SSL code.  The SSL documentation included with 
this distribution is covered by the same copyright terms 
except  that  the  holder  is  Tim  Hudson  (tjh@cryptsoft.
com).

Copyright remains Eric Young’s, and as such any Copyright 
notices in the code are not to be removed.

If this package is used in a product, Eric Young should be 
given attribution as the author of the parts of the library 
used.    This  can  be  in  the  form  of  a  textual  message  at 
program startup or in documentation (online or textual) 
provided with the package.

Redistribution  and  use  in  source  and  binary  forms,  with 
or without modification, are permitted provided that the 
following conditions are met:

1. Redistributions of source code must retain the copyright 
notice, this list of conditions and the following disclaimer.

2.  Redistributions  in  binary  form  must  reproduce  the 
above  copyright  notice,  this  list  of  conditions  and  the 
following disclaimer in the documentation and/or other 
materials provided with the distribution.

3. All advertising materials mentioning features or use of this 
software must display the following acknowledgement:

    “This product includes cryptographic software written 
by Eric Young ([email protected])”

    The word ‘cryptographic’ can be left out if the routines 
from the library being used are not cryptographic related 
:-).

4. If you include any Windows specific code (or a derivative 
thereof)  from  the  apps  directory  (application  code)  you 
must include an acknowledgement: “This product includes 
software written by Tim Hudson ([email protected])”

THIS  SOFTWARE  IS  PROVIDED  BY  ERIC  YOUNG  ``AS  IS’’ 
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, 
BUT  NOT  LIMITED  TO,  THE  IMPLIED  WARRANTIES  OF 
MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 
PURPOSE  ARE  DISCLAIMED.    IN  NO  EVENT  SHALL 

Содержание Linksys RVS4000

Страница 1: ...BUSINESS SERIES Model RVS4000 4 Port Gigabit Security Router with VPN User Guide ...

Страница 2: ...ademark of Cisco Systems Inc and or its affiliates in the U S and certain other countries Copyright 2008 Cisco Systems Inc All rights reserved Other brands and product names are trademarks or registered trademarks of their respective holders ...

Страница 3: ...do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Security www linksys com security Copyright andTrademarks Linksys is a registered trademark or trademark of Cisco Systems Inc and or its affiliates in the U S and...

Страница 4: ...the Linksys VPN client software to VPN Router 5 Chapter 4 Product Overview 6 Front Panel 6 Back Panel 6 Chapter 5 Setting Up and Configuring the Router 7 Setup 7 Setup Summary 7 Setup WAN 8 Setup LAN 11 Setup DMZ 12 Setup MAC Address Clone 13 Setup Advanced Routing 13 Setup Time 14 Setup IP Mode 14 Firewall 15 Firewall Basic Settings 15 Firewall IP Based ACL 15 Firewall Internet Access Policy 17 F...

Страница 5: ...2 VLAN Membership 29 L2 RADIUS 29 L2 Port Setting 30 L2 Statistics 30 L2 Port Mirroring 30 L2 RSTP 30 Status 31 Status Gateway 31 Status Local Network 31 Appendix A Troubleshooting 33 Frequently Asked Questions 38 Appendix B Using Linksys QuickVPN forWindows 2000 XP orVista 41 Overview 41 Before You Begin 41 Installing the Linksys QuickVPN Software 41 Installing from the CD ROM 41 Downloading and ...

Страница 6: ...Address 52 Configuration of the RVS4000 52 Configuration of the RV082 52 Configuration of PC 1 and PC 2 53 Configuration when Both Gateways Use Dynamic IP Addresses 53 Configuration of the RVS4000 53 Configuration of the RV082 54 Configuration of PC 1 and PC 2 54 Appendix E Trend Micro ProtectLink Gateway Service 55 Overview 55 How to Access the Web Based Utility 55 How to Purchase Register or Act...

Страница 7: ... Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 65 Appendix I Software License Agreement 69 Software in Linksys Products 69 Software Licenses 69 Schedule 1 Linksys Software License Agreement 69 Schedule 2 70 Schedule 3 73 Appendix J Contact Information 76 ...

Страница 8: ...nto your office network from off site Users connecting through a VPN tunnel are attached to your company s network with secure access to files e mail and your intranet just as if they were in the building You can also use the VPN capability to allow users on your small office network to securely connect out to a corporate network The QoS features provide consistent voice and video quality througho...

Страница 9: ...Internet and its dynamic IP address has expired the DHCP server will assign it a new dynamic IP address A DHCP server can either be a designated PC on the network or another network device such as the Router By default the Router s Internet Connection Type is Obtain an IP automatically DHCP The PC or network device obtaining an IP address is called the DHCP client DHCP frees you from having to ass...

Страница 10: ...net This helps the administrators to set up company policies on how to use the Internet bandwidth wisely The signature file is the heart of the IPS system It is similar to the Virus definition file on your PC s Anti Virus software IPS uses this file to match against packets coming into the Router and performs actions accordingly The RVS4000 is shippedwithasignaturefilecontaining1000 rules which co...

Страница 11: ... the hacker has either sniffed or spoofed enough information he can now perform a man in the middle attack This attack is performed when data is being transmitted from one network to another by rerouting the data to a new destination Even though the data is not received by its intended recipient it appears that way to the person sending the data These are only a few of the methods hackers use and ...

Страница 12: ...figuring a Gateway to Gateway IPSec Tunnel VPN Router to VPN Router Computer using the LinksysVPN client software toVPN Router The following is an example of a computer to VPN Router VPN In her hotel room a traveling businesswoman dials up her ISP Her notebook computer has the Linksys VPN client software which is configured with her office s IP address She accesses the Linksys VPN client software ...

Страница 13: ...ding or receiving data over that port INTERNET Green The Internet LED lights up the appropriate LED depending upon the speed of the device attached to the Internet port If the Router is connected to a cable or DSL modem typically the 10 LED will be the only LED lit up Flashing indicates activity Back Panel The Router s ports and Reset button are located on the back panel of the Router Back Panel R...

Страница 14: ...ab then select the appropriate screen By default the Setup tab s Summary screen is the first screen displayed following login The utility s tabs and screens are described below For brevity screen names are listed using the notation TabName ScreenName Setup The Setup tab is used to access all of the Router s basic setup functions The device can be used in most network settings without changing any ...

Страница 15: ...f VPN tunnels that are available Log Setting Status E mail If this displays Email cannot be sent because you have not specified an outbound SMTP server address then you have not set up the mail server Click the E mail hyperlink to display the Administration Log screen where you can configure the SMTP mail server Setup WAN Internet ConnectionType The Router supports six types of connections Each Se...

Страница 16: ...gs to save the changes or click Cancel Changes to undo your changes PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe and Israel only PPTP IP Address This is the Router s IP address when seen from the WAN or the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by externa...

Страница 17: ... Point Protocol PPP across the Internet It is used mostly in European countries Check with your ISP for the necessary setup information L2TP IP Address This is the Router s IP address when seen from the WAN or the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by external users on the Internet including your ISP ...

Страница 18: ...Service DDNS Service is disabled by default To enable DDNS Service follow these instructions Sign up for DDNS Service 1 DynDNS Sign up for DDNS service at www dyndns org and write down your User Name Password and Host Name information TZO Sign up for DDNS service at www tzo com and write down your E mail Address Password and Domain Name information Select the DDNS service provider whose service yo...

Страница 19: ...blank Static IP Mapping Static IP Mapping is used to bind a specific IP address to a specific MAC address This helps external WAN users to access LAN servers that are advertised through NAPT port forwarding You can define up to 50 entries Static IP Address Enter the IP address to be mapped MAC Address Enter the MAC address to be mapped Host Name Enter the host name to be mapped Click Add to create...

Страница 20: ...Routing The Router s dynamic routing feature can be used to automatically adjust to physical changes in the network s layout The Router can use the dynamic RIP protocol to calculate the most efficient route for the network s data packets to travel between the source and the destination based upon the shortest paths The RIP protocol regularly broadcasts routing information to other routers on the n...

Страница 21: ...ields and enter the hour minutes and seconds in the Time fields using 24 hour format For example for 10 00 pm enter 22 in the hours field 0 in the minutes field and 0 in the seconds field Set the local time using Network Time Protocol NTP Automatically If you wish to use a NetworkTime Protocol server to set the time and date select this option then complete the following fields Time Zone Select th...

Страница 22: ...he field provided Subnet Allows access from the Subnet that you enter in the field provided Remote Upgrade This option allows you to upgrade the Router remotely To allow remote upgrade select Enable The Remote Management feature must be set to Enable as well The default is Disable Multicast Passthrough If an IGMP Proxy running on the Router set this to Enable to cause the Router to allow IP Multic...

Страница 23: ...vice Select the service types to which the rule will apply You can either select one of the predefined services in the drop down menu select ALL to allow or deny all typesofIPtraffic ordefineanewservicebyclickingService Management to bring up the ServiceManagementscreen then the new service s Name select the Type TCP UDP or TCP UDP enter the Start Port and Finish Port then click Save The new servi...

Страница 24: ...licy Name Days Time and a checkbox to delete clear thepolicy Todeleteapolicy checkthecheckbox in the Delete column and click Delete VieworchangethePCscoveredbythecurrentpolicy click Edit List of PCs to display the List of PCs popup Internet Policy Summary List of PCs On the List of PCs popup you can define PCs by MAC Address or IP Address You can also enter a range of IP Addresses if you want this...

Страница 25: ... used by Internet users is different from the port number used by the server or Internet application For example you could configure your Web Server to accept connections on both port 80 standard and port 8080 Then enable Port Forwarding and set the External Port to 80 and the Internal Port to 8080 Now any traffic from the Internet to your Web server will be using port 8080 even though the Interne...

Страница 26: ... port range triggering for the relevant application Click Save Settings to save the settings you have entered Click Cancel Changes to cancel any changes you have entered VPN VPN Summary VPN Summary Tunnels Used Displays the number of tunnels used Tunnel s Available Displays the number of available tunnels Detail button Click Detail to display more tunnel information Tunnel Status No Displays the n...

Страница 27: ...Name FQDN Authentication IP Only If this is selected the RVS4000 s WAN IP address automatically appears in the IP Address field IP Domain Name FQDN Authentication This is the same as IP Only but includes a domain name for greater security Enter an arbitrary domain name in the Domain Name field The Router s WAN IP address automatically appears in the IP Address field Local Security Group Type Selec...

Страница 28: ...on method Authentication Authenticationdeterminesamethod to authenticate the ESP packets Either MD5 or SHA1 may be selected Note that both sides VPN endpoints must use the same Authentication method MD5 A one way hashing algorithm that produces a 128 bit digest SHA1 A one way hashing algorithm that produces a 160 bit digest Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will gen...

Страница 29: ...ortthecertificate for administrator A dialog will ask you to specify where you want to store your certificate The default file name is RVS4000_Admin pem but you can use another name The certificate for administrator contains the private key and needs to be stored in a safe place as a backup If the router s configuration is reset to the factory default this certificate can be imported and restored ...

Страница 30: ...P EntertheIPaddressorIPrangeyouneedtocontrol The default is zero which includes all internal IP addresses Direction Select Upstream for outbound traffic or Downstream for inbound traffic Mini Rate Enter the minimum rate for the guaranteed bandwidth Max Rate Enter the maximum rate for the guaranteed bandwidth Enable Check this box to enable this Rate Control Rule Add to list After a rule is set up ...

Страница 31: ... Settings to save your settings Click Cancel Changes to cancel any changes you have entered Administration The Administration tab provides access to system administration settings and tools It includes the following screens Administration Management Administration Management Local Gateway Access Gateway Userlist Select the desired Gateway User List Gateway Username Enter the user name here Gateway...

Страница 32: ...number Email Alerts Email Alerts Select Enable to cause an e mail to be sent immediately if a DoS Denial of Service attack is detected If enabled fill in the e mail address information in the remaining fields in this section Denial of Service Thresholds Enter the number of DoS Denial of Service attacks which need to be blocked by the built in Firewall before an e mail alert is sent The minimum val...

Страница 33: ...umber from the drop down menu Pair Identifies a specific pair A B C or D in the cable Each cable consists of 8 pins 4 pairs Cable Length Displays the length of the cable in meters Status Displays the status of the pair Administration Backup Restore Administration Backup Restore To download a copy of the current configuration and store the file on your PC click Backup to start the download Restore ...

Страница 34: ...T Normalization of Telnet negotiation strings RPC RPC record fragging detection Signature Update Before upgrading the firmware download and extract the Router firmware upgrade file from the Linksys website www linksys com Enter the firmware upgrade file name in the Signature Update field or click Browse to find the file Then click Update and follow the on screen instructions IPS P2P IM IPS P2P IM ...

Страница 35: ... of ports and can be created per unit per device per stack or any other logical connection combination as VLANs are software based and not defined by physical attributes VLANs function at layer 2 SinceVLANs isolate traffic within the VLAN a Layer 3 router is needed to allow traffic flow between VLANs Layer 3 routers identify segments and coordinate with VLANs VLANs are broadcast and multicast doma...

Страница 36: ...half of the table is used to assign port membership for the selectedVLAN The default for each port is Exclude the port is not a member of the VLAN To make a port a member of the VLAN select the applicable mode s For example if the port mode is Untagged select Untagged if the mode is Tagged select Tagged if the mode is Trunk select either Tagged or Untagged L2 RADIUS L2 Switch RADIUS Mode Select En...

Страница 37: ... from the selected port Rx Bytes Displays the number of Bytes received on the selected port Rx Frames Displays the number of Frames received on the selected port Tx Errors Displays the number of error packets transmitted from the selected port Rx Errors Displays the number of error packets received from the selected port L2 Port Mirroring L2 Switch Port Mirroring Mirror Source Use this to enable o...

Страница 38: ...he type of the connection Interface Displays the Gateway Internet Interface IP Address Displays the Gateway Internet IP Address Subnet Mask Displays the Subnet Mask that is associated with the IP address above Default Gateway Displays your ISP s Gateway DNS 1 2 Displays the DNS Domain Name System IP addresses currently used by this Gateway IP Conntrack Click this button to display the IP Conntrack...

Страница 39: ...n a screen showing you which PCs are utilizing the Router as a DHCP server On the DHCP Client Table screen you will see a list of DHCP clients PCs and other network devices with the following information Client Names Interfaces IP Addresses MAC Addresses and the length of time before their assigned IP addresses expire ARP RARP Table Clicking this button will open a screen showing you which PCs are...

Страница 40: ...P to get that information or go to its website for the information Click 6 OK in the TCP IP properties window and click Close or OK for the Network window Restart the computer when asked 7 Windows 2000 Click 1 Start Settings and Control Panel Double click Network and Dial Up Connections Right click the 2 Local Area Connection that is associated with the Ethernet adapter you are using and click Pro...

Страница 41: ...lly is selected in the TCP IP settings for your Ethernet adapter At the command prompt type 4 ping followed by your Internet IP address and press Enter The Internet IP Address can be found in the web interface of the Router For example if your Internet IP address is 1 2 3 4 you would enter ping 1 2 3 4 and press Enter If you get a reply the computer is connected to the Router If you do NOT get a r...

Страница 42: ...onnecting to the IPSec server Refer to I need to set up online game hosting or use other Internet applications below for details Check the Linksys website at www linksys com for more information I need to set up a server behind my Router To use a server like a web ftp or mail server you need to know the respective port numbers they are using For example port 80 HTTP is used for web port 21 FTP is ...

Страница 43: ...computer Select 5 Enable to enable DMZ Hosting When you have completed the configuration click Save Settings I forgot my password or the password prompt always appears when saving settings to the Router Reset the Router to factory defaults by pressing the Reset button for ten seconds and then releasing it If you are still getting prompted for a password when saving settings then perform the follow...

Страница 44: ...y need to re establish connection periodically To connect to the Router go to the web browser and 1 enter http 192 168 1 1 or the IP address of the Router Enter the password if asked default password is 2 admin On the 3 Setup WAN tab select the option Keep Alive and set the Redial Period option at 20 seconds Click 4 Save Settings If the connection is lost again follow steps 1 and 2 to re establish...

Страница 45: ...unnel connected to my RVS4000 but I cannot see the computers in the remote network from Windows Explorer QuickVPN tunneling does not support NetBIOS Broadcast To access the computers or shared drives on the remote network users are advised to use the IP address to identify the resource I have a Gateway to Gateway IPSec VPN tunnel connected between two RVS4000 routers but the users in one network c...

Страница 46: ...ownload a file with your FTP client try using another FTP program The web page hangs downloads are corrupt or nothing but junk characters are being displayed on the screen What do I need to do Force your Ethernet adapter to 10Mbps or half duplex mode and turn off the Auto negotiate feature of your Ethernet adapter as a temporary measure Please look at the Network Control Panel in your Ethernet ada...

Страница 47: ...ny platform that supports Ethernet and TCP IP is compatible with the Router How many ports can be simultaneously forwarded Theoretically the Router can establish 2 048 sessions at the same time but you can only forward 30 ranges of ports Does the Router replace a modem Is there a cable or DSL modem in the Router No this version of the Router must work in conjunction with a cable or DSL modem Which...

Страница 48: ...he username in the 3 Username field Enter the password in the 4 Password field and enter it again in the Re enter to confirm field Click 5 Add Save Click the 6 Active checkbox for VPN Client No 1 Click 7 Save Settings VPN Client Accounts Screen Installing the Linksys QuickVPN Software Installing from the CD ROM Insert the RVS4000 CD ROM into your CD ROM drive 1 Go to the Start menu and then click ...

Страница 49: ...ck Help To begin your QuickVPN connection click 3 Connect The connection s progress is displayed Connecting Provisioning Activating Policy and Verifying Network When your QuickVPN connection is established the 4 QuickVPN tray icon turns green and the QuickVPN Status screen appears The screen displays the IP address of the remote end of the VPN tunnel the time and date theVPN tunnel began and the t...

Страница 50: ... VPN Client Accounts Click c Generate to generate a new certificate Click d Export for Client and save the certificate as a PEM file Distribute the certificate to all QuickVPN users 2 Each QuickVPN user must then install the certificate as 3 follows Save the certificate into the directory where a the QuickVPN Client is installed For example C Program Files Linksys QuickVPN Client Launch the QuickV...

Страница 51: ... mentioned in this appendix are for illustration purposes only Windows 2000 or Windows XP IPAddress 140 111 1 2 UserISPprovidesIPAddress this is only an example Subnet Mask 255 255 255 0 RVS4000 WAN IP Address 140 111 1 1 User ISP provides IP Address this is only an example Subnet Mask 255 255 255 0 LAN IP Address 192 168 1 1 Subnet Mask 255 255 255 0 How to Establish a Secure IPSecTunnel Step 1 C...

Страница 52: ...hanged these settings enter your new values If you want to enter a description for your filter click 5 the Description tab and enter the description there Click 6 OK Then click OK or Close in the IP Filter List window Filter List 2 router win The 7 New Rule Properties screen will appear Select the IP Filter List tab and make sure that win Router is highlighted Then click Add New Rules Properties T...

Страница 53: ...nnel Rules Tunnel 1 win Router On the 1 IP Filter List tab select filter list win Router IP Filter List Tab Click the 2 Filter Action tab and click the filter action Require Security radio button Then click Edit Filter Action Tab On the 3 Security Methods tab verify that the Negotiate security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check bo...

Страница 54: ...onnections Then click the OK or Close button to finish this rule Connection Type Tab Tunnel 2 Router win In the new policy s Properties screen make sure 9 that win Router is selected and deselect the Use Add Wizard check box Then click Add to create the second IP filter Properties Screen Go to the 10 IP Filter List tab and click the filter list Router win IP Filter List Tab Click the 11 Filter Act...

Страница 55: ...Yours should be a key that is unique but easy to remember Then click OK Preshared Key This new Preshared key will be displayed Click the 14 Apply button to continue if it appears on your screen otherwise proceed to the next step New Preshared Key Clickthe 15 TunnelSettingtab ClicktheradiobuttonThe tunnel endpoint is specified by this IP Address and enter the Windows 2000 XP computer s IP Address T...

Страница 56: ...nter 0 for the last set of IP Addresses e g 192 168 1 0 Enter the IP Address and Subnet Mask of the VPN 6 device at the other end of the tunnel the remote VPN Router or device with which you wish to communicate in the Remote Group Setup fields Select from two types of authentication 7 MD5 and SHA1 SHA1 is recommended because it is more secure As with encryption either of these may be selected prov...

Страница 57: ...Remote Gateway Uses a Dynamic IP RVS4000 WAN A A A A LAN 192 168 5 1 RV082 WAN B B B B LAN 192 168 1 1 Gateway to Gateway IPSec VPN Tunnel Remote Gateway Using Static IP NOTE Each computer must have a network adapter installed Configuration of the RVS4000 Follow these instructions for the first VPN Router designated RVS4000 The other VPN Router is designated the RV082 Launch the web browser for a ...

Страница 58: ...WAN IP address B B B B of the RV082 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RV082 s local network settings in the IPAddressand Subnet Mask fields RV082 VPN Settings For the Remote Security Gateway Type select 8 IP address Enter the RVS4000 s WAN IP address in the IP Address field For the Remote Security Group Type select 9 Subnet Enter the RVS4000 ...

Страница 59: ... select 6 Enable The WAN IP address A A A A of the RVS4000 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RVS4000 s local network settings in the IP Address and Subnet Mask fields RVS4000 IPSec VPN Settings For the Remote Security Gateway Type select 8 IP by DNS Resolved Enter the RV082 s domain name in the field provided For the Remote Security Group Typ...

Страница 60: ...ormation If the computers can ping each other then you know the VPN tunnel is configured correctly Configuration when Both Gateways Use Dynamic IP Addresses This example assumes both Gateways are using dynamic IP addresses If only the Remote Gateway uses a dynamic IP address refer to Configuration when the Remote Gateway Uses a Dynamic IP RVS4000 Dynamic IP A A A A with Domain Name www xyz com LAN...

Страница 61: ... IPSec VPN tab Click the 4 Gateway to Gateway tab Enter a name in the 5 Tunnel Name field For the VPN Tunnel setting select 6 Enable The WAN IP address B B B B of the RV082 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RV082 s local network settings in the IPAddressand Subnet Mask fields RV082 VPN Settings For the Remote Security Gateway Type select 8 IP...

Страница 62: ...the Password on the Setup Password screen Then click OK Login Screen How to Purchase Register or Activate the Service You can purchase register or activate the service using the ProtectLink screen ProtectLink Click the ProtectLink tab to display this screen NOTE If the ProtectLink tab is not displayed upgrade the Router s firmware Refer to Appendix F Firmware Upgrade for instructions ProtectLink F...

Страница 63: ...t the appropriate Filtering option Business Hours To filter this URL category during the business hours you have specified select this option Leisure Hours To filter this URL category during non business hours select this option Instances Blocked The number of attempted visits is displayed Business Hour Setting Business Days Select the appropriate days The default days are Mon through Fri Business...

Страница 64: ...hanges to undo them ProtectLink Email Protection The Email Protection features are provided by an online service called IMHS which stands for InterScan MessagingHostedSecurity Itchecksyoure mailmessages so spam viruses and inappropriate content are filtered out After you have configured the IMHS settings your e mail messages will be checked online before appropriate messages are forwarded to your ...

Страница 65: ...nse information online click this link Status The status of your license Activated or Expired is displayed Platform The platform type Gateway Service is automatically displayed License expires on The date and time your license expires are displayed Renew To renew your license click Renew Then follow the on screen instructions Add Seats Each seat allows an e mail account to use Email Protection To ...

Страница 66: ...59 Trend Micro ProtectLink Gateway Service 4 Port Gigabit Security Router with VPN Appendix E ...

Страница 67: ...tem Application Anomaly Detection HTTP FTP Telnet RCP P2P Control Instant Messenger Control L3 L4 Protocol IP TCP UDP ICMP Normalization L7 Signature Matching Signature Update Manual download from the Web Secure Management HTTPS Username Password 802 1X Port based RADIUS Authentication EAP MD5 EAP PEAP QoS Service based Service based Bandwidth Management supports Rate Control and Priority Prioriti...

Страница 68: ...9 W x H x D 170 x 41 x 170 mm Unit Weight 0 84 lb 0 38 kg Power 12V 1A Certification FCC Class B CE ICES 003 Operating Temp 32 to 104ºF 0 to 40ºC Storage Temp 4 to 158ºF 20 to 70ºC Operating Humidity 10 to 85 Noncondensing Storage Humidity 5 to 90 Noncondensing Specifications are subject to change without notice ...

Страница 69: ... Return Materials Authorization RMA number You are responsible for properly packaging and shipping your product to Linksys at your cost and risk You must include the RMA number and a copy of your dated proof of Appendix G Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period which begins on the date...

Страница 70: ...and Canada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies...

Страница 71: ...et other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lig...

Страница 72: ...ká směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními ...

Страница 73: ... το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ...

Страница 74: ...ult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietm...

Страница 75: ...a pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odla...

Страница 76: ... ONE OF ITS AFFILIATES CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR...

Страница 77: ...iately without notice from Linksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNIT...

Страница 78: ...ually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMSANDCONDITIONSFORCOPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a no...

Страница 79: ...rnative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interfac...

Страница 80: ... published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software F...

Страница 81: ...s product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This l...

Страница 82: ...OFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenceanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied a...

Страница 83: ...rmation Website http www linksys com Support Site http www linksys com support FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization http www linksys com warranty NOTE Details on warranty and RMA issues can be found in the Warranty section of this Guide 7112610B JL ...

Отзывы: