background image

 

Cisco RV132W ADSL2+ Wireless-N VPN Router and

Cisco RV134W VDSL2 Wireless-AC VPN Route

r

 

ADMINISTRATION 

GUIDE

Содержание RV132W

Страница 1: ...Cisco RV132W ADSL2 Wireless N VPN Router and Cisco RV134W VDSL2 Wireless AC VPN Router ADMINISTRATION GUIDE ...

Страница 2: ...and or its affiliates in the U S and other countries To view a list of Cisco trademarks go to this URL www cisco com go trademarks Third party trademarks mentioned are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 1110R ...

Страница 3: ...istics 10 PPTP Server 10 IPSec Connection Status 10 View Logs 11 Connected Devices 12 Port Statistics 12 Mobile Network 13 Chapter 3 Networking 15 WAN Configuration 15 Configuring WAN Connections 15 Configuring a Mobile Network 48 Setting Failover and Recovery 51 LAN Configuration 52 Configuring LAN Connections 53 Configuring VLAN Membership 54 Configuring Static DHCP 55 Viewing DHCP Leased Client...

Страница 4: ... Static Routing 65 Configuring Routing RIPng 66 Configuring Router Advertisement 67 Configuring Advertisement Prefixes 68 Chapter 4 Wireless Networks 70 Wireless Security 70 Basic Wireless Settings 72 Configuring Advanced Wireless Settings 80 Configuring WPS 83 Chapter 5 Firewall 85 Basic Firewall Settings 86 Schedule Management Configuration 90 Services Management Configuration 90 Access Rules Co...

Страница 5: ... 103 Certificate Management 112 Configuring PPTP 113 Configuring VPN Passthrough 115 Chapter 7 Quality of Service QoS 116 Bandwidth Management 116 Configuring Bandwidth 116 Configuring QoS Binding Policy 117 Configuring QoS Port Based Settings 119 Configuring CoS Settings 120 Configuring DSCP Settings 120 Chapter 8 Administration 121 Password Complexity 121 Configuring User Accounts 122 Configurin...

Страница 6: ...port Key Settings 129 Logging Configuration 129 Configuring Log Settings 129 Configuring E Mail Settings 131 Discovery Bonjour Configuration 132 LLDP Properties Configuration 134 Time Settings Configuration 134 Download and Backup Configuration File 135 Firmware Upgrade 138 Firmware Recovery Steps 139 Reboot 140 Restoring the Factory Defaults 140 ...

Страница 7: ...er To change this behavior check Don t show on start up Initial Settings Change Default Administrator Password Displays the User Account page where you can change the administrator password and set up a guest account See Configuring User Accounts Launch Setup Wizard Launches the Router Setup Wizard Follow the on screen instructions Configure WAN Settings Opens the Internet Setup page to modify the...

Страница 8: ...mware Opens the Firmware Upgrade page to update the device firmware See Firmware Upgrade Add VPN Clients For RV134W only Opens the PPTP Server page to set up and manage the VPN tunnels See Configuring PPTP Configure Remote Management Access Opens the Basic Settings page to enable the basic features of the device See Basic Firewall Settings System Summary Displays the System Summary page that shows...

Страница 9: ... client device STEP 1 Open the wireless connection settings window or program for your device Your computer might have special software installed to manage wireless connections or you might find the wireless connections under the Control Panel in the Network Connections or Network and Internet window The location depends on your operating system STEP 2 Enter the network name SSID that you chose fo...

Страница 10: ...to the configuration page for that section For more information on managing the settings displayed on the Dashboard page see Configuring Log Settings Site to Site IPsec VPN Configuring WAN Connections Configuring LAN Connections From the Refresh Rate drop down list select the rate at which the latest statistics and parameter values are refreshed on the dashboard The Dashboard page also displays an...

Страница 11: ...works configured on the Wireless Basic Settings For more information see Basic Wireless Settings Firewall Setting Status Displays the DoS WAN request and remote management settings configured on the Firewall Basic Settings Basic Settings page For more information see Basic Firewall Settings PPTP Server Status Displays the available PPTP VPN connections and the connected users for each VPN type For...

Страница 12: ... numerical data is displayed in long form To reset the wireless statistics counters click Clear Count The counters are reset when the device is rebooted PPTP Server Select Status and Statistics PPTP Server to view a list of your PPTP VPN connections the duration of the connection and the actions you can perform on this connection For more information about configuring PPTP VPN connections see Conf...

Страница 13: ...logs The event severity levels are listed from the highest severity to the lowest severity as follows Emergency Messages about events such as a system crash Alert Messages about conditions that require immediate corrective action Critical Messages for when the system is in a critical condition Error Messages about conditions that are not critical but require corrective action Warning System warnin...

Страница 14: ...dress Resolution Protocol ARP request If a device does not respond to the request it is removed from the list IPv6 NDP Table displays all IPv6 Neighbor Discovery Protocol NDP devices connected to the device s local link Port Statistics The Port Statistics page displays detailed port activity To view port statistics select Status and Statistics Port Statistics To refresh the page at regular interva...

Страница 15: ...e that link has been up Current Session Usage Volume of data being received Rx and transmitted Tx on the mobile link Monthly Usage Monthly data download and bandwidth usage Manufacturer Card manufacturer name Card Model Card model number Card Firmware Card firmware version SIM Status Subscriber identification module SIM status IMS The unique identification associated with the GSM UMTS or LTE netwo...

Страница 16: ...rk Cisco RV132W ADSL2 Wireless N and RV134W VDSL2 Wireless AC VPN Router Administration Guide 14 2 Service Type Type of service accessed Signal Strength Strength of the wireless mobile network signal Card Status Status of the data card ...

Страница 17: ...Ethernet the device will check if the DSL link is up If it is up the device will use the DSL link as the WAN interface if it is down the device will check if the Ethernet link is up and if it is up it will use the Ethernet link as the WAN interface DSL the device will use the DSL link as the WAN interface Ethernet the device uses Ethernet link as the WAN interface STEP 3 Click Edit RV132W or Add R...

Страница 18: ... typically used for most broadband data services Pcr Rate When the QoS is set to CBR VBR rt or VBR nrt enter the Peak Cell Rate PCR in cells per second Scr Rate When the QoS is set to VBR nrt or VBR rt enter the Sustained Cell Rate SCR in cells per second Auto Detect Check Enable to enable or Disable to disable automatic detection of the VPI and VCI values that identify your line to the ATM networ...

Страница 19: ...on Check Enable or Disable to enable or disable the SRA a protocol which by decoupling the modulation and framing layer can change the transmission data rate parameters applied by the modulation layer DSL Modulation Select the DSL modulation from the drop down list The default DSL modulation is Multimode recommended Ethernet LAN Ports Select the Ethernet LAN ports LAN1 LAN2 LAN3 or LAN4 RV134W onl...

Страница 20: ...trol LLC encapsulation and Virtual Channel VC multiplexing QoS Type Select the DSL Quality of Service QoS Unspecified Bit Rate UBR Constant Bit Rate CBR Variable Bit Rate real time VBR rt Variable Bit Rate non real time VBR nrt CBR provides the best guarantee of low latency UBR provides none but is typically used for most broadband data services Pcr Rate When the QoS is set to CBR VBR rt or VBR nr...

Страница 21: ...nsmission data rate parameters applied by the modulation layer DSL Modulation Select the DSL modulation from the drop down list The default DSL modulation is Multimode recommended Transfer Mode PTM SRA Seamless Rate Adaption Check Enable or Disable to enable or disable the SRA a protocol which by decoupling the modulation and framing layer can change the transmission data rate parameters applied b...

Страница 22: ... Dynamic it means that if the RA Router Advertisement message that the device receives has an M Flag 0 the device uses SLAAC Stateless Address Auto configuration to get the IPv6 address if the M Flag is 1 the device uses DHCPv6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 Prefix Delegation To assign...

Страница 23: ...etting the QoS setting will take precedence MTU Maximum Transmission Unit MTU is an advanced configuration that allows you to determine the largest data size permitted on your connection Select Auto default or Manual to configure manually Size Enter the size of bytes Range 576 1500 Default 1500 MAC Address Clone At times you may need to set the MAC address of the device WAN port to be identical to...

Страница 24: ...ed within a DSL virtual circuit You can choose between a Logical Link Control LLC encapsulation and Virtual Channel VC multiplexing QoS Type Select the DSL Quality of Service QoS Unspecified Bit Rate UBR Constant Bit Rate CBR Variable Bit Rate real time VBR rt Variable Bit Rate non real time VBR nrt CBR provides the best guarantee of low latency UBR provides none but is typically used for most bro...

Страница 25: ...n layer DSL Modulation Select the DSL modulation from the drop down list The default DSL modulation is Multimode recommended Internet IP Address Enter the IP address Hint 192 168 100 100 Subnet Mask Enter the subnet mask Hint 255 255 255 0 Default Gateway Enter the default gateway Hint 192 168 100 1 Static DNS 1 2 Enter the IP address of the primary and or secondary Static DNS in the fields Hint 1...

Страница 26: ... Bit Rate UBR Constant Bit Rate CBR Variable Bit Rate real time VBR rt Variable Bit Rate non real time VBR nrt CBR provides the best guarantee of low latency UBR provides none but is typically used for most broadband data services Pcr Rate When the QoS is set to CBR VBR rt or VBR nrt enter the Peak Cell Rate PCR in cells per second Scr Rate When the QoS is set to VBR nrt or VBR rt enter the Sustai...

Страница 27: ...on layer DSL Modulation Select the DSL modulation from the drop down list The default DSL modulation is Multimode recommended Transfer Mode PTM SRA Seamless Rate Adaption Check Enable or Disable to enable or disable the SRA a protocol which by decoupling the modulation and framing layer can change the transmission data rate parameters applied by the modulation layer DSL Modulation Select the DSL m...

Страница 28: ...ts off in the Max Idle Time field Keep Alive When you select this option the Internet connection is always on In the Redial Period field enter the number of seconds after which the device attempts to reconnect if it is disconnected Authentication Type Select the authentication type from the drop down list Auto Negotiation The server sends a configuration request specifying the security algorithm s...

Страница 29: ... is 1 the device uses DHCPv6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 The IPv6 connection is PPPoE as well The IPv4 and IPv6 connection share the same PPPoE setting Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or...

Страница 30: ... specify the day of the week and time of day MTU Maximum Transmission Unit MTU is an advanced configuration that allows you to determine the largest data size permitted on your connection Select Auto default or Manual to configure manually Size Enter the size of bytes Range 576 1492 Default 1492 MAC Address Clone Sometimes you may need to set the MAC address of the device WAN port to be identical ...

Страница 31: ...t Rate UBR Constant Bit Rate CBR Variable Bit Rate real time VBR rt Variable Bit Rate non real time VBR nrt CBR provides the best guarantee of low latency UBR provides none but is typically used for most broadband data services Pcr Rate When the QoS is set to CBR VBR rt or VBR nrt enter the Peak Cell Rate PCR in cells per second Scr Rate When the QoS is set to VBR nrt or VBR rt enter the Sustained...

Страница 32: ...he IP address of the primary and or secondary Static DNS in the fields Hint 1 2 3 4 Connect on Demand Max Idle Time Select this option if your ISP charges based on the amount of time that you are connected When you select this option the Internet connection is on only when traffic is present If the connection is idle that is no traffic is flowing the connection is closed If you Connect on Demand e...

Страница 33: ... Handshake Authentication Protocol MS CHAP Microsoft version of the Challenge Handshake Authentication Protocol MS CHAP2 Microsoft version of the Challenge Handshake Authentication Protocol version 2 Mode IPv6 Address Mode Select Dynamic or Static If you select Dynamic it means that if the RA Router Advertisement message that the device receives has an M Flag 0 the device uses SLAAC Stateless Addr...

Страница 34: ... Manual If you choose Manual enter the following information IPv6 Prefix IPv6 Prefix Length Border Relay IPv4 Mask Length NAT Network Address Translation If enabled all outbound traffic through this interface is NAT ed If disable all outbound traffic through this interface is routed MTU Maximum Transmission Unit MTU is an advanced configuration that allows you to determine the largest data size pe...

Страница 35: ...alled When you place a router behind the cable modem or DSL modem the MAC address from the device WAN port is not recognized by the ISP In this case to configure your device to be recognized by the ISP you can clone the MAC address of the WAN port to be the same as your computer MAC address To configure a MAC address clone select Enable MAC Address To set the MAC address of the device WAN port do ...

Страница 36: ...t Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or Manual If you choose Manual enter the following information IPv6 Prefix IPv6 Prefix Length Border Relay IPv4 Mask Length NAT Network Address Translation If ena...

Страница 37: ... installed When you place a router behind the cable modem or DSL modem the MAC address from the device WAN port is not recognized by the ISP In this case to configure your device to be recognized by the ISP you can clone the MAC address of the WAN port to be the same as your computer MAC address To configure a MAC address clone select Enable MAC Address To set the MAC address of the device WAN por...

Страница 38: ...s DHCPv6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or Manual If you choose Manual enter the following information IPv6 Prefix IPv6 Prefix Length Border Relay IPv4 Mask ...

Страница 39: ...AC Address Clone Sometimes you may need to set the MAC address of the device WAN port to be identical to your PC or some other MAC address This is called MAC address cloning For example some ISPs register your computer card MAC address when the service is first installed When you place a router behind the cable modem or DSL modem the MAC address from the device WAN port is not recognized by the IS...

Страница 40: ...u Connect on Demand enter the number of minutes after which the connection shuts off in the Max Idle Time field Keep Alive When you select this option the Internet connection is always on In the Redial Period field enter the number of seconds after which the device attempts to reconnect if it is disconnected Authentication Type Select the authentication type from the drop down list Auto Negotiatio...

Страница 41: ...e uses DHCPv6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 The IPv6 connection is PPPoE as well The IPv4 and IPv6 connection share the same PPPoE setting Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or Manual If you ...

Страница 42: ... the Time field Weekly Choose this option to reset the PPPoE connection at a given day of the week Then specify the day of the week and time of day MTU Maximum Transmission Unit MTU is an advanced configuration that allows you to determine the largest data size permitted on your connection Select Auto default or Manual to configure manually Size Enter the size of bytes Range 576 1492 Default 1492 ...

Страница 43: ...r Enter IP address Hint 192 168 1 10 Username Enter the username Password Enter the password DNS Server Source Select Get Dynamically from ISP or Use These DNS Servers to manually configure Static DNS 1 2 Enter the IP address of the primary and or secondary Static DNS in the fields Hint 1 2 3 4 Connect on Demand Max Idle Time Select this option if your ISP charges when you are connected When you s...

Страница 44: ...ss Address Auto configuration to get the IPv6 address if the M Flag is 1 the device uses DHCPv6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or Manual If you choose Manual...

Страница 45: ...Range 576 1460 Default 1460 MAC Address Clone Sometimes you may need to set the MAC address of the device WAN port to be identical to your PC or some other MAC address This is called MAC address cloning For example some ISPs register your computer card MAC address when the service is first installed When you place a router behind the cable modem or DSL modem the MAC address from the device WAN por...

Страница 46: ... server address If you already have DNS server addresses from your ISP choose Use these DNS Servers and enter the primary and secondary addresses in the Static DNS 1 and Static DNS 2 fields To get DNS server addresses from your ISP choose Get Dynamically from ISP Connect on Demand Select this option if your ISP charges based on the amount of time that you are connected When you select this option ...

Страница 47: ...h the security type sent earlier by the server PAP The device uses the Password Authentication Protocol PAP to connect to the ISP CHAP The device uses the Challenge Handshake Authentication Protocol CHAP when connecting with the ISP MS CHAP or MS CHAPv2 The device uses Microsoft Challenge Handshake Authentication Protocol when connecting with the ISP MPPE Encryption Microsoft Point to Point Encryp...

Страница 48: ...v6 to get the IPv6 address If you select Static enter the following information IPv6 Address IPv6 Prefix Length Default IPv6 Gateway IPv6 DNS1 DNS2 Prefix Delegation To assign a network address prefix from ISP to LAN enable Prefix Delegation Mode 6rd 6rd Tunneling Select Auto or Manual If you choose Manual enter the following information IPv6 Prefix IPv6 Prefix Length Border Relay IPv4 Mask Length...

Страница 49: ...lly Size Enter the size of bytes Range 576 1460 Default 1460 MAC Address Clone Sometimes you may need to set the MAC address of the device WAN port to be identical to your PC or some other MAC address This is called MAC address cloning For example some ISPs register your computer card MAC address when the service is first installed When you place a router behind the cable modem or DSL modem the MA...

Страница 50: ... the Max Idle Time field If your Internet connection is terminated due to inactivity the modem automatically reestablishes a connection when a user attempts to access the Internet In the Max Idle Time field enter the number of minutes of idle time that can elapse before the Internet connection terminates Select Keep Alive to keep the connection active at all times To connect or disconnect your mod...

Страница 51: ...vider for the Internet connection Username Password Username and password provided by your mobile network service provider SIM PIN PIN code associated with your SIM card This field is only displayed for GSM SIM cards You can modify the SIM PIN in either Auto or Manual mode Server Name Name of the server for the Internet connection if provided by your service provider Authentication Authentication ...

Страница 52: ...ive Setting Failover and Recovery While both Ethernet and mobile network links are available only one connection can be used to establish a WAN link at a time When one WAN connection fails the device attempts to establish a connection on another interface This feature is called Failover When the primary WAN connection is restored it reverts to the original path and ends the backup connection This ...

Страница 53: ...ately when Ethernet is available or click Switch back to Ethernet in a specific time range and enter the start and end time for the range STEP 7 In the Connection Validation Site field choose the site from which to perform failover validation Use the next hop gateway by default the device pings the default gateway or choose a custom site and enter the site IPv4 or IPv6 address STEP 8 Click Save to...

Страница 54: ...s information Host Name Host name Domain Name Domain name VLAN The VLAN number Local IP Address Local LAN IP address of the device Make sure this IP address is not used by another device Subnet mask Subnet mask for the local IP address The default subnet mask is 255 255 255 0 Enable Allows the device to act as the DHCP server in the network Disable Disables DHCP on the device when you want to manu...

Страница 55: ...not be deleted You can create up to five other VLANs on the device To create a VLAN STEP 1 Select Networking LAN VLAN Membership STEP 2 Click Add Row End IP Address The last address in the IP address pool Any DHCP client joining the LAN is assigned an IP address in this range Client Lease time Duration in minutes that IP addresses are leased to clients DNS Server Select DNS server from the drop do...

Страница 56: ...n 2 to 4094 VLAN ID 1 is reserved for the default VLAN and is used for untagged frames received on the interface Description A description that identifies the VLAN Inter VLAN Routing Inter VLAN routing is the capability to route traffic between vlans Check Disable to disable Port 1 Port 2 Port 3 Port 4 Available only on the RV134W You can associate VLANs on the device to the LAN ports on the devic...

Страница 57: ...ing LAN DHCP Leased Client Tables For every VLAN defined on the device a table displays a list of the clients associated with the VLAN To assign a static IP address to one of the connected devices STEP 1 In the row of the connected device check Add to Static DHCP STEP 2 Click Save Description Description of the client IP Address The IP address you want assigned to the client device Static DHCP ass...

Страница 58: ...the DMZ from both the LAN or WAN In the event of an attack on any of the DMZ nodes the LAN is not necessarily vulnerable You must configure a fixed static IP address for the endpoint that you designate as the DMZ host You should assign the DMZ host an IP address in the same subnet as the device LAN IP address but it cannot be identical to the IP address given to the LAN interface of this gateway T...

Страница 59: ...irections simultaneously 100Mbps Half 100 Mbps in both directions but only one direction at a time 100Mbps Full 100 Mbps in both directions simultaneously Flow Control Check to enable flow control for this port Flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from outrunning a slow receiver It provides a mechanism for the receiver to ...

Страница 60: ...ernal networks It allows the router to exchange its routing information automatically with other routers and allows it to dynamically adjust its routing tables and adapt to changes in the network Dynamic RIP enables the device to automatically adjust to physical changes in the network layout and exchange routing tables with the other routers The router determines the network packets route based on...

Страница 61: ...te the authentication Simple Password Authentication Choose this option to validate the simple password authentication Enter the password in the field MD5 Authentication Choose this option to validate the MD5 authentication MD5 Key ID Enter a numerical range from 1 to 255 default is 1 MD5 Auth Key Enter the MD5 authentication key Length 1 to 64 characters STEP 6 Passive Interface determines how th...

Страница 62: ...routers with varying public IP addresses to be located using Internet domain names To use DDNS you must set up an account with a DDNS provider such as DynDNS com or noip com The router notifies dynamic DNS servers of changes in the WAN IP address so that any public services on your network can be accessed by using the domain name To configure DDNS STEP 1 Select Networking Dynamic DNS STEP 2 You ca...

Страница 63: ...connection type and other parameters in these pages To select an IP mode STEP 1 Select Networking IP Mode STEP 2 From the IP Mode drop down menu select one of the following options STEP 3 Click Save Host Name The name of the host account Internet IP Address Read only Internet IP address of your device Status Read only Indicates that the DDNS update has completed successfully or the account update ...

Страница 64: ...o the following mode LAN IPv4 IPv6 WAN IPv4 IPv6 See Configuring the IP Mode for more information on how to set the IP mode To configure IPv6 LAN settings STEP 1 Select Networking IPv6 IPv6 LAN Configuration STEP 2 Enter the following information to configure the IPv6 LAN address STEP 3 Click Save or continue to configure IPv6 DHCP LAN settings IPv6 Address Enter the IPv6 address of the device The...

Страница 65: ...t requests DHCP addresses Domain Name Optional Domain name of the DHCPv6 server Server Preference Server preference level of this DHCP server DHCP advertise messages with the highest server preference value to a LAN host are preferred over other DHCP server advertise messages The default is 255 DNS Server Select DNS Server name from the drop down list Static DNS 1 IPv6 address of the primary DNS s...

Страница 66: ...ur network To create a static route STEP 1 Select Networking IPv6 IPv6 Static Routing STEP 2 In the list of static routes click Add Row STEP 3 Enter this information Name Route name Destination IPv6 address of the destination host or network for this route Prefix Length Number of prefix bits in the IPv6 address that define the destination subnet Gateway IPv6 address of the gateway through which th...

Страница 67: ...a directly connected network is 0 The hop count between two directly connected routers is 1 When the hop count is greater than or equal to 16 the destination network or host is unreachable By default the routing update is sent every 30 seconds If the router receives no routing updates from a neighbor after 180 seconds the routes learned from the neighbor are considered as unreachable After another...

Страница 68: ... Mode Select one of the following modes Unsolicited Multicast Send Router Advertisements RAs to all interfaces belonging to the multicast group Unicast only Restrict advertisements to well known IPv6 addresses only RAs are sent to the interface belonging to the known address only Advertise Interval Advertise interval 4 1800 for the Unsolicited Multicast The default is 30 The advertise interval is ...

Страница 69: ...es This extension is backward compatible both for routers setting the router preference value and hosts interpreting the router preference value These values are ignored by hosts that do not implement router preference This feature is useful if there are other RADVD enabled devices on the LAN MTU MTU size 0 or 1280 to 1500 The default is 1500 bytes The maximum transmission unit MTU is the size of ...

Страница 70: ...e 68 3 STEP 4 Click Save IPv6 Prefix Length The prefix length variable is a decimal value that indicates the number of contiguous higher order bits of the address that make up the network portion of the address Prefix Lifetime Prefix lifetime or the length of time over which the requesting router is allowed to use the prefix ...

Страница 71: ...Networking Configuring LAN Settings Cisco RV132W ADSL2 Wireless N and RV134W VDSL2 Wireless AC VPN Router Administration Guide 69 3 ...

Страница 72: ...twork and can be up to 32 characters in length To protect your network change the default wireless network name to a unique name to distinguish your wireless network from other wireless networks that may exist around you When choosing a name do not use personal information because this information may be available for anyone to see when browsing for wireless networks Change the default password Fo...

Страница 73: ...ertified are required to support WPA2 but are not required to support WEP A network encrypted with WPA WPA2 is more secure than a network encrypted with WEP because WPA WPA2 uses dynamic key encryption To protect the information as it passes over the airwaves enable the highest level of encryption supported by your network equipment WEP is an older encryption standard and may be the only option av...

Страница 74: ...ks SSID Name for RV132W ciscosb1 ciscosb2 ciscosb3 ciscosb4 Enabled Yes No No No SSID Broadcast Enabled Enabled Enabled Enabled Security Mode WPA2 Personal Disabled Disabled Disabled MAC Filter Disabled Disabled Disabled Disabled VLAN 1 1 1 1 Wireless Isolation with SSID Disabled Disabled Disabled Disabled WMM Enabled Enabled Enabled Enabled WPS Enabled Disabled Disabled Disabled SSID Name for RV1...

Страница 75: ...ss Isolation with SSID Disabled Disabled Disabled Disabled WMM Enabled Enabled Enabled Enabled WPS Enabled for 2 4G but Disabled by default for 5G Disabled Disabled Disabled SSID Name for RV134W ciscosb1_2 4 G or ciscosb1_5G ciscosb2_2 4 G or ciscosb2_5G ciscosb3_2 4 G or ciscosb3_5G ciscosb4_2 4G or ciscosb4_5G B G N Mixed If you have Wireless N Wireless B and Wireless G devices in your network T...

Страница 76: ...D feature also referred to as WMM Power Save which allows the radio to conserve power U APSD is a power saving scheme optimized for real time applications such as VoIP transferring full duplex data over WLAN By classifying outgoing IP traffic as voice data these types of applications can increase battery life by approximately 25 and minimize transmit delays STEP 7 Optional In the Wireless Table co...

Страница 77: ...gs STEP 4 Click Save Enable SSID Click On to enable the network SSID Name Enter the name of the network SSID Broadcast Check this box to enable SSID broadcast If SSID broadcast is enabled the wireless router advertises its availability to wireless equipped devices in the range of the router Security Mode See Configuring the Security Mode MAC Filter See Configuring MAC Filtering VLAN Select the VLA...

Страница 78: ...e appears STEP 3 In the Select SSID field select the SSID for which to configure the security settings STEP 4 From the Security Mode menu select WEP STEP 5 In the Authentication Type field select one of the following options Open System This is the default option Shared Key Select this option if your network administrator recommends this setting If you are unsure select the default option In both ...

Страница 79: ...tandard specified in the final 802 11i standard WPA2 supports AES encryption and this option uses Preshared Key PSK for authentication WPA2 Personal Mixed Allows both WPA and WPA2 clients to connect simultaneously using PSK authentication The personal authentication is the PSK that is an alphanumeric passphrase shared with the wireless peer To configure the WPA2 Personal security mode STEP 1 In th...

Страница 80: ...t to connect using the RADIUS server authentication To configure the WPA2 Enterprise security mode STEP 1 In the Wireless Table Wireless Basic Settings check the box for the network you want to configure STEP 2 Click Edit Security Mode STEP 3 In the Select SSID field select the SSID for which to configure the security settings STEP 4 From the Security Mode menu select one of the two WPA2 Enterpris...

Страница 81: ...C Filtering field check the Enable box to enable MAC Filtering for this SSID STEP 4 In the Connection Control field select the type of access to the wireless network Prevent Select this option to prevent devices with the MAC addresses listed in the MAC Address Table from accessing the wireless network This option is selected by default Permit Select this option to allow devices with the MAC addres...

Страница 82: ...lds specify the time during the day when access to the network is allowed STEP 5 Click Save Configuring Advanced Wireless Settings Advanced wireless settings should be adjusted only by an expert administrator incorrect settings can reduce wireless performance To configure advanced wireless settings STEP 1 Select Wireless Advanced Settings The Advanced Settings page appears STEP 2 Configure these s...

Страница 83: ...device can transmit at all wireless rates The Basic Rate is not the actual rate of data transmission If you want to specify the device rate of data transmission configure the Transmission Rate setting Transmission Rate The rate of data transmission should be set depending on the speed of your wireless network You can select from a range of transmission speeds or you can select Auto to have the dev...

Страница 84: ...40 and 3 500 milliseconds The default value is 100 DTIM Interval This value between 1 and 255 indicates the interval of the Delivery Traffic Indication Message DTIM A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages When the device has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a ...

Страница 85: ...on on this page Enter the WPS PIN number of the client and click Register A client device requires a PIN number from this router use the router PIN number indicated Device PIN Identifies the PIN of a device trying to connect PIN Lifetime The lifetime of the key If the time expires a new key is negotiated Enable AP with Enrollee PIN Check to make PIN Lifetime editable manually RTS Threshold If you ...

Страница 86: ...C VPN Router Administration Guide 84 4 Preshared Key Choose Add Client to existing network Use Existing PSK or Reconfigure network Generate New PSK After you configure WPS the following information appears at the top of the WPS page Wi Fi Protected Setup Status Network Name SSID and Security ...

Страница 87: ...DMZ Schedules as to when the router should apply the rules Keywords in a domain name or URL of a web page that the router should allow or block Rules for allowing or blocking inbound and outbound Internet traffic for specified services on specified schedules MAC addresses of devices whose inbound access to your network the router should block Port triggers that signal the router to allow or block ...

Страница 88: ...se the IP address if a static address is assigned to the WAN port or if your WAN address is dynamic a DDNS Dynamic DNS name can be used Outbound LAN DMZ to WAN rules restrict access to traffic leaving your network by selectively allowing only specific local users to access specific outside resources The default outbound rule is to allow access from the secure zone LAN to either the public DMZ or i...

Страница 89: ...part of the IP address For example https remote ip remote port or https 168 10 1 11 443 IPv4 Multicast Passthrough IGMP Proxy Check Enable to enable multicast passthrough for IPv4 IPv6 Multicast Passthrough IGMP Proxy Check Enable to enable multicast passthrough for IPv6 Unicast RPF Unicast Reverse Path Forwarding Unicast RPF can help limit the malicious traffic on an enterprise network It works b...

Страница 90: ...omputers or other UPnP enabled devices If disabled the device does not allow the application to add the forwarding rule Allow Users to Disable Internet Access Check Enable to allow users to disable Internet access Block Java Check to block Java applets Java applets are small programs embedded in web pages that enable the dynamic functionality of the page A malicious applet can be used to compromis...

Страница 91: ...ock ActiveX content Similar to Java applets ActiveX controls are installed on a Windows computer while running Internet Explorer A malicious ActiveX control can be used to compromise or infect computers Enabling this setting blocks ActiveX applets from being downloaded Click Auto to automatically block ActiveX or click Manual and enter a specific port on which to block ActiveX Block Proxy Check to...

Страница 92: ...wall Schedule Management STEP 2 Click Add Row STEP 3 In the Name field enter a unique name to identify the schedule This name is available on the Firewall Rule Configuration page in the Select Schedule list See Access Rules Configuration STEP 4 In the Scheduled Days section select if you want to apply the schedule to All Days or Specific Days If you select Specific Days check the box next to the d...

Страница 93: ...Name field enter the service name for identification and management purposes STEP 4 In the Protocol field select the Layer 4 protocol that the service uses from the drop down list TCP UDP TCP UDP ICMP ICMPv6 Other STEP 5 In the Start Port field enter the first TCP or UDP port of the range that the service uses STEP 6 In the End Port field enter the last TCP or UDP port of the range that the servic...

Страница 94: ...licy STEP 1 Select Firewall Access Rules STEP 2 Select Allow or Deny NOTE Ensure that IPv6 support is enabled on the device to configure an IPv6 firewall STEP 3 Click Save Reordering Access Rules The order in which access rules are displayed in the access rules table indicates the order in which the rules are applied You may want to reorder the table to have certain rules applied before other rule...

Страница 95: ...n to create an inbound rule Inter VLAN VLAN VLAN Select this option to create an inter VLAN rule Inter VLAN VLAN DMZ Select this option to create an inter VLAN rule STEP 4 From the Action drop down list select the action Always Block Always block the selected type of traffic Always Allow Never block the selected type of traffic Block by schedule Blocks the selected type of traffic according to a s...

Страница 96: ...r the address in the Start field Address Range The rule applies to traffic originating from an IP address located in a range of addresses Enter the starting IP address in the Start field and the ending IP address in the Finish field STEP 7 From the Source IP drop down list choose the source IP addresses to which the rule blocks or allows packets from Any The rule applies to all source IP addresses...

Страница 97: ...ses only Select Never to disable logging NOTE When traffic is going from the LAN or DMZ to the WAN the system requires rewriting the source or destination IP address of incoming IP packets as they pass through the firewall STEP 10 Rule Status Check Enable to enable the new access rule STEP 11 Click Save Internet Access Policy Configuration The device supports several options for blocking Internet ...

Страница 98: ...Allow by schedule click Configure Schedules to create a schedule See Schedule Management Configuration STEP 6 Select a schedule from the drop down list STEP 7 Optional Apply the access policy to specific PCs to allow or block traffic coming from specific devices a In the Apply Access Policy to the Following PCs table click Add Row b From the Type drop down list select how to identify the PC by MAC...

Страница 99: ... a firewall appear to have public IP addresses To add a One to One NAT rule STEP 1 Select Firewall One to One NAT STEP 2 Click Add Row STEP 3 In the Private Range Begin field enter the starting IP address in the private LAN IP address range STEP 4 In the Public Range Begin field enter the starting IP address in the public WAN IP address range STEP 5 In the Range Length enter the number of public I...

Страница 100: ...oing traffic is made STEP 4 In the Internal Port field enter the port number used by the remote system to respond to the request it receives STEP 5 From the Protocol drop down list select a protocol TCP UDP or TCP UDP STEP 6 In the Interface drop down list select DSL_ATM_WAN DSL_PTM_WAN ETH_WAN or USB_WAN STEP 7 In the IP Address field enter the IP address of the host on the LAN side to which the ...

Страница 101: ...ng while an application is transmitting data over the opened outgoing or incoming ports Port triggering opens an incoming port for a specific type of traffic on a defined outgoing port Port triggering is more flexible than static port forwarding available when configuring firewall rules because a rule does not have to reference a specific LAN IP or IP range Ports are also not left open when not in...

Страница 102: ...t DSL_ATM DSL_PTM ETH_WAN or USB_WAN STEP 6 In the Enable field check the Enable box to enable the rule STEP 7 Click Save Attack Protection Configuration Use the Attack Protection page to specify how to protect your network against common types of attacks including discovery flooding and echo storms STEP 1 Click Firewall Attack Protection STEP 2 Check the following and enter a numeric range for ea...

Страница 103: ...ze requests to a target system STEP 3 Click Save Session Settings Configuration You can limit the maximum number of unidentified sessions and half open sessions on the Cisco RV132W RV134W You can also introduce timeouts for TCP and UDP sessions to ensure Internet traffic is not deviating from expectations in your private network To configure session settings STEP 1 Select Firewall Session Setting ...

Страница 104: ...VPN tunnels at the corporate site so that the branch site has secure access to the corporate network To configure basic VPN settings for a site to site IPsec connection STEP 1 Choose VPN Site to Site IPsec VPN Basic VPN Setup STEP 2 In the New Connection Name field enter a name for the VPN tunnel STEP 3 In the Pre Shared Key field enter the pre shared key or password which will be exchanged betwee...

Страница 105: ... remote WAN and remote LAN IP addresses cannot exist on the same subnet For example a remote LAN IP address of 192 168 1 100 and a local LAN IP address of 192 168 1 115 causes a conflict when traffic is routed over the VPN The third octet must be different so that the IP addresses are on different subnets For example a remote LAN IP address of 192 168 1 100 and a local LAN IP address of 192 168 2 ...

Страница 106: ...ion authentication and key group parameters in your VPN policy are compatible with settings at the remote router To add an IKE policy STEP 1 On the Advanced VPN Setup page in the IKE Policy Table click Add Row STEP 2 In the Policy Name field enter a unique name for the IKE policy STEP 3 In the Exchange Mode field choose one of the following modes for the policy Main Negotiates the tunnel with high...

Страница 107: ...ame of the certificate has the same type value as the Identifier That also means if the CSR of the certificate is generated by the device under the menu VPN Site to Site IPSec VPN Certificate Management Generate CSR the IP Address Domain Name or Email Address should be filled with the correct value c In the Diffie Hellman DH Group field specify the DH Group algorithm used when exchanging a pre sha...

Страница 108: ...n the Policy Type field choose one of the following options Auto Policy Some parameters for the VPN tunnel are generated automatically This requires using the Internet Key Exchange IKE protocol for negotiations between the two VPN endpoints Manual Policy All parameters including the keys for the VPN tunnel are manually entered for each end point No third party server or organization is involved c ...

Страница 109: ...ork IP address in the IP Address field Enter the subnet mask such as 255 255 255 0 in the Subnet Mask field The field automatically displays the default subnet address based on the IP address NOTE Do not use overlapping subnets for remote or local traffic selectors Using these subnets would require adding static routes on the router and the hosts to be used For example avoid Local Traffic Selector...

Страница 110: ...me Enter the duration of the Security Association in seconds After the specified number of seconds the Security Association is renegotiated The default value is 3600 seconds The minimum value is 30 seconds Protocol Select the protocol from the drop down list ESP or AH Encryption Algorithm Select the algorithm used to encrypt the data Integrity Algorithm Select the algorithm used to verify the inte...

Страница 111: ...te you will need the network addresses of all of the spoke sites Configuring the Hub Site When configuring the hub site you will create two VPN policies for the hub site at the same time for example VPN policy HubToSpoke1 andHubToSpoke2 at the same time To configure the hub enter the following information STEP 1 On the Advanced VPN Setup page in the VPN Policy Table click Add Row STEP 2 To configu...

Страница 112: ...nter the IP address Redundant Enable Leave unchecked NetBIOS Leave unchecked Local Traffic Section Local IP Select Subnet from the drop down list IP Address Enter the local LAN subnet for example 192 168 1 0 and 192 168 74 0 for HubToSpoke1 or 192 168 1 0 and 192 168 75 0 for HubToSpoke2 Subnet Netmask Enter 255 255 255 0 then click Add to enter the address in the IP Subnet List Remote Traffic Sec...

Страница 113: ... Leave unchecked NetBIOS Leave unchecked Local Traffic Section Local IP Select Subnet from the drop down list IP Address Enter local LAN subnet for example 192 168 75 0 for Spoke1ToHub or 192 168 74 0 for Spoke2ToHub Subnet Netmask Enter 255 255 255 0 then click Add to enter the address in the IP Subnet List Remote Traffic Section Remote IP Select Subnet from the drop down list IP Address Enter re...

Страница 114: ...cal certificates as well as the generated CSR are also shown in the table The default local certificate is self signed and may be exported but not deleted It is used only by HTTPS GUI access All other local certificates can be deleted and exported The CA certificates can be deleted but not exported The CSRs can be deleted and exported The Action column also has an Import button for the CSRs It is ...

Страница 115: ...onal Locality Name Municipality optional Organization Name Organization optional Organizational Unit Name Subset of the organization Common Name Common name of the organization Key Encryption Length Length of the key IP Address IP address optional If you want to use the Local WAN IP as the Local Identifier enter the value of the Local WAN IP here Domain Name Name of the domain optional If you want...

Страница 116: ...passing through the PPTP VPN connection check Enable to enable MPPE Encryption The MPPE encryption for the PPTP server support is 128 bit STEP 3 Click Save Creating and Managing PPTP Users To create and enable PPTP users STEP 1 In the VPN Client Setting Table click Add Row STEP 2 Enter the username and password that will authenticate the PPTP user Enter values that are between 1 to 64 characters l...

Страница 117: ...n Guide 115 6 Configuring VPN Passthrough VPN passthrough allows VPN traffic that originates from VPN clients to pass through the device To configure VPN passthrough STEP 1 Choose VPN VPN Passthrough STEP 2 Check the Enable check box to choose the type of traffic to allow to pass through the device STEP 3 Click Save ...

Страница 118: ...dth Management You can use the device bandwidth management feature to manage the bandwidth of the traffic flowing from the secure network LAN to the insecure network WAN Configuring Bandwidth You can limit the bandwidth to reduce the rate at which the device transmits data You can also use a bandwidth profile to limit the outbound traffic which prevents the LAN users from consuming all of the band...

Страница 119: ...ect the source IP from the drop down list It can be any IP address a single IP address or an IP address range Destination IP Select the destination IP from the drop down list It can be any IP address a single IP address or an IP address range MAC Address Select the type of MAC address from the drop down list It can be Any or Single MAC address This is the MAC address of the source of this traffic ...

Страница 120: ...ings of an entry in the table check the relevant box and click Edit When you are done making changes click Save To delete an entry from the table check the relevant box and click Delete Click Save Remarking Check Enable to enable remarking on the Class of Service CoS or Differentiated Services Code Point DSCP CoS or DSCP Enter the remarking value for packets on this network ...

Страница 121: ... default port based QoS settings click Restore Default and save your changes Trust Mode Select one of the following options from the drop down menu Port Enables port based QoS settings You can then set the traffic priority for a particular port The traffic queue priority starts at the lowest priority of 1 and ends with the highest priority of 4 DSCP Differentiated Services Code Point DSCP Enabling...

Страница 122: ...pes with higher or lower traffic priority depending on the type of traffic STEP 3 Click Save To restore the default port based QoS settings click Restore Default and click Save Configuring DSCP Settings You can use the DSCP Settings page to configure DSCP to QoS queue mapping To configure DSCP to QoS queue mapping STEP 1 Select QoS DSCP Settings STEP 2 Select whether only to list RFC values or to ...

Страница 123: ...password changes To configure password complexity settings STEP 1 Select Administration Password Complexity STEP 2 In the Password Complexity Enforcement field check Enable STEP 3 Configure password complexity settings Minimum password length Enter the minimum password length 0 32 characters Maximum password length Enter the maximum password length 64 80 characters Minimum number of character clas...

Страница 124: ...dministration Users STEP 2 In the Account Activation field check the boxes for the accounts that you want to activate The admin account must be active STEP 3 Optional To edit the administrator account under Administrator Account Setting check Edit Administrator Settings To edit the guest account under Guest Settings check Edit Guest Settings Enter the following information The new password must be...

Страница 125: ...mns To import user accounts from a CSV file STEP 1 In the Import User Name Password field click Browse STEP 2 Locate the file and click Open STEP 3 Click Import STEP 4 Click Save New Password Enter the new password We recommend that the password contains no dictionary words from any language and is a mix of letters both uppercase and lowercase numbers and symbols The password can be up to 64 chara...

Страница 126: ...ctivity Select Never to allow the administrator to stay logged in permanently STEP 3 In the Web Guest Inactivity Timeout field enter the number in minutes before a session times out due to inactivity Select Never to allow the administrator to stay logged in permanently STEP 4 In the SSH Inactivity Timeout field enter the number in minutes before a session times out due to inactivity Select Never t...

Страница 127: ...E can initiate the connection to the ACS To configure the TR 069 settings STEP 1 Click Administration TR 069 Settings The TR 069 Settings page opens STEP 2 In the TR 069 Settings area click Enable to enable the TR 069 client or click Disable to disable it STEP 3 In the IP Protocol area check IPv4 or IPv6 protocol STEP 4 In the Inform area check Enable to enable Inform or Disable to disable it STEP...

Страница 128: ... of download request and then click Send to send the corresponding download request to the TR 069 server Firmware Request to download the firmware of the RV132W RV134W from the TR 069 server Vendor Configuration Request to download the configuration file from the TR 069 server STEP 9 Check Connection Request Authentication and enter the following information Username Enter the username to log in u...

Страница 129: ...or a fully qualified domain name such as www cisco com to ping STEP 3 Click Ping The ping results appear These results tell you if the device is reachable Or click Traceroute The Traceroute results appear Performing a DNS Lookup You can use the Lookup tool to find out the IP address of the host for example a Web FTP or Mail server on the Internet To retrieve the IP address of a Web FTP Mail or any...

Страница 130: ...rs network traffic by sending copies of all incoming and outgoing packets from one port to a monitoring port You can use port mirroring as a diagnostic or debugging tool when fending off an attack or viewing user traffic from LAN to WAN to see if users are accessing information or websites they are not supposed to The LAN host PC should use a static IP address to avoid any issues with port mirrori...

Страница 131: ...s key001 Please include the key when you open a support case with Cisco and want the support engineer to access your device remotely To setup a remote support key enter the name of the key in the Remote Support Key field Logging Configuration Configure logs to monitor activity that indicates the health and performance of your device Configuring Log Settings To configure logging STEP 1 Select Admin...

Страница 132: ...ail address All log types that are higher in severity than the selected log type are automatically included and cannot be excluded For example if you select Error logs Emergency Alert and Critical are also selected The event severity levels are listed from the highest to the lowest Emergency System is not usable Alert Action is needed Critical System is in a critical condition Error System is in e...

Страница 133: ...ver associated with the email account that you have setup for example mail companyname com E mail Server Port Enter the SMTP server port If your email provider requires a special port for email enter it here Otherwise use the default 25 Return E mail Address Enter the return email address that the device will send messages to if logs from the router to the send to email address are undeliverable S...

Страница 134: ...very Bonjour STEP 2 Check Enable to enable Bonjour E mail Authentication Password Enter the email authentication password for example the password used to access the email account you have set up to which to send logs E mail Test Click Test to test email authentication Unit Select the unit of time for the logs Never Hourly Daily or Weekly If you select Never logs are not sent Day If you select a w...

Страница 135: ...l Table check the corresponding Enable Bonjour box You can enable Bonjour on specific VLANs Enabling Bonjour on a VLAN allows devices on the VLAN to discover the Bonjour services available on the router such as HTTP HTTPS For example if a VLAN is configured with an ID of 2 devices and hosts on the VLAN 2 cannot discover the Bonjour services running on the router unless Bonjour is enabled for VLAN ...

Страница 136: ...lick Save Time Settings Configuration You can configure your time zone whether or not to adjust for Daylight Savings Time and with which Network Time Protocol NTP server to synchronize the date and time The router then gets its date and time information from the NTP server To configure NTP and time settings STEP 1 Select Administration Time Settings The current time is displayed STEP 2 Enter infor...

Страница 137: ...TION During a restore operation do not try to go online turn off the firewall shut down the PC or use the firewall until the operation is complete This should take about a minute When the test light turns off wait a few more seconds before using the firewall Daylight Saving Offset Select the offset from Coordinated Universal Time UTC from the drop down menu Set Date and Time Choose if you want the...

Страница 138: ... Settings admin My Documents Downloads STEP 4 To clear the selected configuration click Clear Startup configuration Select this option to download the startup configuration The Startup Configuration is the most current running configuration that the device uses If the router startup configuration has been lost use this page to copy the Backup Configuration to the Startup configuration and have all...

Страница 139: ...device then restarts and uses the new configuration Copying the Configuration Settings Copy the Startup Configuration to the Backup Configuration to ensure that you have a backup copy in case you forget your username and password and get locked out of Device Manager To get back into Device Manager reset the device to factory default The Backup Configuration file remains in memory and allows the ba...

Страница 140: ...n off the device shut down the PC or interrupt the process in any way until the operation is complete This process takes about a minute including the reboot process Interrupting the upgrade process at specific points when the flash memory is being written to may corrupt it and render the router unusable Upgrading Firmware To update the router with a newer version of the firmware STEP 1 Select Admi...

Страница 141: ... powered on The PWR LED will turn red Usually the original configuration will be restored after the new firmware is uploaded To enter the recovery mode manually connect the console cables baud rate 115200 Power on and the boot up log will be displayed on the console terminal Press any key to stop the normal startup The PWR LED will turn red Usually the original configuration is restored after the ...

Страница 142: ...ring the Factory Defaults CAUTION During a restore operation do not try to go online turn off the router shut down the PC or use the router until the operation is complete This should take about a minute When the test light turns off wait a few more seconds before using the router To restore factory defaults to the router STEP 1 Select Administration Reboot STEP 2 Check Return to factory default s...

Страница 143: ... No login is required Cisco Open Source Requests If you wish to receive a copy of the source code to which you are entitled under the applicable free open source license s such as the GNU Lesser General Public License please send your request to external opensource requests cisco com In your requests please include the Cisco product name version and the 18 digit reference number for example 7XEEX1...

Отзывы: