manualshive.com logo in svg
background image

A Division of Cisco Systems, Inc.

®

Model No.

WIRED

VPN Router

10/100 4-Port

RV042

User Guide

 

Содержание RV042

Страница 1: ...A Division of Cisco Systems Inc Model No WIRED VPN Router 10 100 4 Port RV042 User Guide ...

Страница 2: ...erms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or Warning and is something that could damage your property or the Router word definition This checkma...

Страница 3: ...ng the Router 11 Overview 11 Connection Instructions 12 Chapter 5 Configuring the PCs 14 Overview 14 Configuring Windows 98 and Millennium PCs 14 Configuring Windows 2000 PCs 15 Configuring Windows XP PCs 15 Chapter 6 Set Up and Configure the Router 17 Overview 17 How to Access the Web based Utility 20 System Summary Tab 20 Setup Tab Network 23 Setup Tab Password 25 Setup Tab Time 25 Setup Tab DMZ...

Страница 4: ...38 VPN Tab Summary 39 VPN Tab Gateway to Gateway 41 VPN Tab Client to Gateway 47 VPN Tab VPN Pass Through 54 Log Tab System Log 54 Log Tab System Statistics 56 Wizard Tab 56 Support Tab 64 Logout Tab 64 Appendix A Troubleshooting 65 Common Problems and Solutions 65 Frequently Asked Questions 75 Appendix B Upgrading Firmware 79 Appendix C Finding the MAC Address and IP Address for Your Ethernet Ada...

Страница 5: ...10 100 4 Port VPN Router Appendix G Specifications 91 Appendix H Warranty Information 92 Appendix I Regulatory Information 93 Appendix J Contact Information 94 ...

Страница 6: ...CP IP for Windows 98 and Me 14 Figure 5 2 Obtain an IP address automatically for Windows 98 and Me 14 Figure 5 3 Internet Protocol TCP IP for Windows 2000 15 Figure 5 4 Obtain an IP address automatically for Windows 2000 15 Figure 5 5 Internet Protocol TCP IP for Windows XP 16 Figure 5 6 Obtain an IP address automatically for Windows XP 16 Figure 6 1 Router s IP Address 20 Figure 6 2 Password 20 F...

Страница 7: ...Dual WAN Load Balance 32 Figure 6 24 SNMP 32 Figure 6 25 DNS Name Lookup 33 Figure 6 26 Ping 33 Figure 6 27 Factory Default 34 Figure 6 28 Are You Sure 34 Figure 6 29 System is Rebooting 34 Figure 6 30 Firmware Upgrade 35 Figure 6 31 Restart 35 Figure 6 32 Setting Backup 35 Figure 6 33 Save File 36 Figure 6 34 Firewall 36 Figure 6 35 Access Rules 37 Figure 6 36 Add a New Access Rule 37 Figure 6 37...

Страница 8: ...nection Type 57 Figure 6 54 Obtain an IP Automatically 58 Figure 6 55 Static IP 58 Figure 6 56 PPPoE 58 Figure 6 57 WAN Connection Type WAN2 59 Figure 6 58 Obtain an IP WAN2 59 Figure 6 59 Static IP WAN2 60 Figure 6 60 PPPoE WAN2 60 Figure 6 61 Save Settings 60 Figure 6 62 Access Rules Policy 61 Figure 6 63 Select the Action 61 Figure 6 64 Select the Service 61 Figure 6 65 Select the Log 62 Figure...

Страница 9: ... Figure B 1 Upgrade Firmware 79 Figure C 1 IP Configuration Screen 80 Figure C 2 MAC Address Adapter Address 80 Figure C 3 MAC Address Physical Address 81 Figure C 4 MAC Address Clone 81 Figure D 1 Wall Mounting the Router 82 ...

Страница 10: ...etwork VPN capability creates encrypted tunnels through the Internet allowing up to 30 remote office or traveling users to securely connect into your office network from off site Users connecting through a VPN tunnel are attached to your company s network with secure access to files e mail and your intranet just as if they were in the building You can also use the VPN capability to allow users on ...

Страница 11: ...ow to use the Web Based Utility to set up the Router and configure its settings Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the 10 100 4 Port VPN Router Appendix B Upgrading Firmware This appendix instructs you on how to upgrade the firmware on your Router if you should need to do so Appendix...

Страница 12: ...for the Router Appendix I Warranty Information This appendix supplies the warranty information for the Router Appendix J Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix K Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Страница 13: ...s that you assign manually to a PC or other device on the network Since a static IP address remains valid until you disable it static IP addressing ensures that the device assigned it will always have that same IP address until you change it Static IP addresses are commonly used with network devices such as server PCs or print servers If you use the Router to share your cable or DSL Internet conne...

Страница 14: ...your local network when e mails are sent to their destination or when you have to connect to your company s network when you are out on the road How is your data protected That is when a VPN can help VPNs are called Virtual Private Networks because they secure data moving outside of your network as if it were still within that network When data is sent out across the Internet from your computer it...

Страница 15: ...ferent servers around the world before reaching its final destination That s a long way to go for unsecured data and this is when a VPN serves its purpose What is a VPN A VPN or Virtual Private Network is a connection between two endpoints a VPN Router for instance in different networks that allows private data to be sent securely over a shared or public network such as the Internet This establish...

Страница 16: ...ings When he connects to his office s router the two routers create a VPN tunnel encrypting and decrypting data As VPNs utilize the Internet distance is not a factor Using the VPN the telecommuter now has a secure connection to the central office s network as if he were physically connected Computer using VPN client software that supports IPSec to VPN Router The following is an example of a comput...

Страница 17: ...nternet LED lights up when the Router is connected to your cable or DSL modem DMZ Internet Green The DMZ Internet LED lights up when the Router is connected to your cable or DSL modem when used as an Internet port and it lights up when the Router is connected to the hub switch or public server when used as a DMZ port DMZ Mode Green The DMZ Mode LED lights up when the Router is using DMZ mode 1 4 L...

Страница 18: ...s with the Router and have tried all other troubleshooting measures press and hold in the Reset button for 30 seconds This will restore the factory defaults and clear all of the Router s settings such as port forwarding or a new password Ports 1 4 LAN These four LAN Ethernet ports connect to network devices such as PCs print servers or additional switches Internet WAN1 The Internet port connects t...

Страница 19: ...f the Router Power The Power port is where you will connect the included AC power cable The security slot is located on the left side panel Security Slot The security slot is where you can attach a lock so the Router will be protected from theft Proceed to Chapter 4 Connecting the Router Figure 3 3 Right Side Panel Figure 3 4 Left Side Panel ...

Страница 20: ... changed the default setting then you will not need to configure your PCs Set up and configure the Router with the setting s provided by your Internet Service Provider ISP according to Chapter 6 Set up and Configure the Router The installation technician from your ISP should have left the setup information with you after installing your broadband connection If not you can call your ISP to request ...

Страница 21: ... 4 2 Connect the other end to an Ethernet port on a network device e g a PC print server hub or switch Repeat this step to connect more PCs or other network devices to the Router 3 Connect your cable or DSL modem s Ethernet cable to the Router s Internet port If using the DMZ Internet port connect a second cable to it and the other end to the network device e g modem or public server 4 Power on th...

Страница 22: ... of the Router as shown in Figure 4 5 and then plug the power adapter into an electrical outlet The System LED on the front panel will light up as soon as the power adapter is connected properly If you need to configure your PCs proceed to Chapter 5 Configuring the PCs Otherwise proceed to Chapter 6 Set Up and Configure the Router Figure 4 5 Connect the Power ...

Страница 23: ...s proceed to Chapter 6 Set Up and Configure the Router Configuring Windows 98 and Millennium PCs 1 Click the Start button Click Settings and then Control Panel From there double click the Network icon 2 On the Configuration tab select the TCP IP line for the applicable Ethernet adapter as shown in Figure 5 1 Do not choose a TCP IP entry whose name mentions Dial Up Adapter PPPoE VPN or AOL If the w...

Страница 24: ...roperties button 3 Select Internet Protocol TCP IP and click the Properties button See Figure 5 3 4 Select Obtain an IP address automatically see Figure 5 4 Once the new windows appears click the OK button Click the OK button again to complete the PC configuration 5 Restart your computer Go to Chapter 6 Set Up and Configure the Router Configuring Windows XP PCs The following instructions assume yo...

Страница 25: ... an IP address automatically see Figure 5 6 Once the new window appears click the OK button Click the OK button again or the Close button if any settings were changed to complete the PC configuration 5 Restart your computer Go to Chapter 6 Set Up and Configure the Router Figure 5 5 Internet Protocol TCP IP for Windows XP Figure 5 6 Obtain an IP address automatically for Windows XP ...

Страница 26: ...on this screen Password You can change the Router s password on this screen it is strongly recommended that you change the Router s password from the default Time Change the time on this screen DMZ Host The DMZ Demilitarized Zone Host feature allows one local user to be exposed to the Internet to use a special purpose service such as Internet gaming or video conferencing Forwarding Port forwarding...

Страница 27: ...rk Management Protocol is a network protocol that provides network administrators with the ability to monitor the status of the Router and receive notification of any critical events as they occur on the network Diagnostic The Router has two built in tools that will help with troubleshooting network problems Factory Default The Factory Default button can be used to clear all of your configuration ...

Страница 28: ...unnel Status and GroupVPN Status Gateway to Gateway By setting this page users can add a new tunnel between two VPN devices Client to Gateway By setting this page you can create a new tunnel between a Local VPN device and a mobile user VPN Pass Through This tab allows you to disable IPSec Pass Through PPTP Pass Through and L2TP Pass Through Log Tab System Log The System Log displays Syslog E mail ...

Страница 29: ...ton with underline it will hyperlink to related setup pages On the right side of the screen and all other screens in the Utility will be a link to the Site Map which has links to all of the Utility s tabs Click the Site Map button to view the Site Map See Figure 6 4 Then click on desired tab subject System Information Serial Number The serial number of the Router Firmware version The current versi...

Страница 30: ...perlinks to WAN Connection type section on the Network page of the Setup Tab When users select Obtain an IP automatically it shows two buttons Release and Renew Users can click the Release button to release the IP that users already have and click the Renew button to update the DHCP Lease Time or get a new IP When users select PPPoE or PPTP it shows Connect Disconnect WAN2 DMZ IP It shows the curr...

Страница 31: ...er of users If GroupVPN is disabled it will show No Group VPN was defined Log Setting Status It hyperlinks to the System Log page of Log Tab If you have not set up the mail server in Log Tab it shows E mail cannot be sent because you have not specified an outbound SMTP server address If you have set up the mail server but the log has not come out due to Log Queue Length and Log Time Threshold sett...

Страница 32: ... DMZ Setting first DMZ In order to allow such services the Router comes with a special DMZ port which is used for setting up public servers The DMZ port sits between the local network ports and the Internet port Servers on the DMZ are publicly accessible but they are protected from attacks such as SYN Flooding and Ping of Death Use of the DMZ port is optional it may be left unconnected Using the D...

Страница 33: ...er your User Name and Password 2 If you select Connect on Demand option the PPPoE connection will be disconnected if it has been idle for a period longer than the Max Idle Time setting 3 If you select Keep Alive option the Router will keep the connection alive by sending out a few data packets at the Redial Period so your Internet service thinks that the connection is still active PPTP Point to Po...

Страница 34: ... Password Enter a new password for the Router Your password must be less than 15 characters long and it can t contain any spaces Confirm New Password Re enter the password for confirmation Click the Save Settings button to save the Password settings or click the Cancel Changes button to undo the changes Setup Tab Time Time The Router uses the time settings to time stamp log events to automatically...

Страница 35: ...from outside users will be forwarded to 192 168 1 2 See Figure 6 13 You may use this function to establish a Web server or FTP server via an IP Gateway Be sure that you enter a valid IP Address You may need to establish a static IP address in order to properly run an Internet server For added security Internet users will be able to communicate with the server but they will not actually be connecte...

Страница 36: ...pull down menu 2 If the Service you need is not listed in menu please click the Service Management button to add the new Service Name and enter the Protocol and Port Range Click the Add to List button Then click the Save Setting button Click the Exit button 3 Enter the Name or IP Address of the server that you want the Internet users to access Then enable the entry Click the Add to List button and...

Страница 37: ...he Public Range Begin field This address will be assigned by the ISP The Router s WAN IP NAT Public Address cannot be included in the range Range Length Enter the number of IP addresses for the range The range length may not exceed the number of valid IP address Up to 64 ranges may be added To map a single address use a Range Length of 1 Note One to One NAT will change the way the firewall functio...

Страница 38: ... adjust to physical changes in the network s layout The Router uses the dynamic RIP protocol It determines the route that the network packets take based on the fewest number of hops between the source and the destination The RIP protocol regularly broadcasts routing information to other routers on the network See Figure 6 19 Working Mode Select Gateway mode if your Router is hosting your network s...

Страница 39: ...ry 1 Destination IP Enter the network address of the remote LAN segment For a standard Class C IP domain the network address is the first three fields of the Destination LAN IP while the last field should be zero 2 Subnet Mask Enter the Subnet Mask used on the destination LAN IP domain For Class C IP domains the Subnet Mask is 255 255 255 0 3 Default Gateway If this Router is used to connect your ...

Страница 40: ...mputer DHCP client requests one The range is 5 43 200 Minutes Range Start End Enter a starting IP address and ending IP address to make a range to assign dynamic IPs The default range is 100 149 WINS Windows Internet Naming Service WINS is a service that resolves NetBIOS names to IP addresses The WINS is assigned if the computer DHCP client requests one If you do not know the WINS leave it as 0 Cl...

Страница 41: ...pstream downstream upstream or downstream bandwidth is excessive 30 40 50 60 70 80 90 bring up the second link When there is an inactivity time out None 10min 20min 30min 40min 50min 60min the second link will be terminated Click the Save Settings button to save the Dual WAN Load Balance settings or click the Cancel Changes button to undo the changes System Management Tab SNMP SNMP or Simple Netwo...

Страница 42: ...anagement Tab Diagnostic The Router has two built in tools that will help with troubleshooting network problems DNS Name Lookup The Internet has a service called the Domain Name Service DNS which allows users to enter an easily remembered host name such as www RV042 com instead of numerical TCP IP addresses to access Internet resources The Router has a DNS lookup tool that will return the numerica...

Страница 43: ...rip Time Minimum Maximum and Average Note Ping requires an IP address The Router s DNS Name Lookup tool may be used to find the IP address of a host System Management Tab Factory Default The Factory Default button can be used to clear all of your configuration information and restore the Router to its factory default settings Only use this feature if you wish to discard all other configuration pre...

Страница 44: ...rmware Upgrade instructions above System Management Tab Restart The recommended method of restarting your Router is to use this Restart tool Restarting with this button will send out your log file before the box is reset Click the Restart Router button to restart the Router See Figure 6 31 System Management Tab Setting Backup This tab allows you to make a backup file of your Preferences file for t...

Страница 45: ...on to maintain connection information that passes through the firewall It will inspect all packets based on the established connection prior to passing the packets for processing through a higher protocol layer DoS Denial of Service Protect internal networks from Internet attacks such as SYN Flooding Smurf LAND Ping of Death IP Spoofing and reassembly attacks Block WAN Request This feature is desi...

Страница 46: ...ules cannot override these four rules Besides the Default Rules all configured Network Access Rules are listed in the table and you can choose the Priority for each custom rule HTTP service from LAN side to RV042 is always allowed DHCP service from LAN side is always allowed DNS service from LAN side is always allowed Ping service from LAN side to RV042 is always allowed Click the Edit button to E...

Страница 47: ...stination IP Select Any Single or Range and enter IP Address for single and range Scheduling Apply this rule time parameter Select the time range and the day of the week for this rule to be enforced The default condition for any new rule is to always enforce Firewall Tab Content Filter Forbidden Domains When the Block Forbidden Domains check box is selected the Router will forbid web access to sit...

Страница 48: ...nel Status Add New Tunnel Click the Add New Tunnel button to add a Gateway to Gateway tunnel or add a Client to Gateway tunnel See Figure 43 Choose a Mode Gateway to Gateway Figure 42 shows the Gateway to Gateway tunnel which is a tunnel created between two VPN Routers Click the Add Now button to see the Gateway to Gateway screen Figure 44 Client to Gateway Figure 43 shows the Client to Gateway tu...

Страница 49: ... Gateway Tunnel Test Click the Connect button to verify the tunnel status The test result will be updated in Status If the tunnel is connected a Disconnect button will be available so you can disconnect the VPN connection Configure Edit and Delete Click the Edit button to link to the original setup page where you can change the settings If you click the Edit button all of your tunnel settings will...

Страница 50: ...this page users can add a new tunnel between two VPN devices See Figure 46 Tunnel No The tunnel number will be generated automatically from 1 30 Tunnel Name Enter the Tunnel Name such as LA Office Branch Site Corporate Site etc This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel Interface You can select the Interface from the pu...

Страница 51: ...ynamic IP select this type When the Remote Security Gateway requests to create a tunnel with the Router the RV042 will work as a responder If you select this type just enter the E mail address for Authentication Local Security Group Type Select the local LAN user s behind the router that can use this VPN tunnel Local Security Group Type may be a single IP address a Subnet or an IP range The Local ...

Страница 52: ... the RV042 will work as a responder If you select this type just enter the Domain Name for Authentication and the Domain Name must be the same as the Local Gateway of the remote VPN device The same Domain Name can be used only for one tunnel connection and users can t use the same Domain Name to create a new tunnel connection Dynamic IP E mail Addr USER FQDN Authentication If you select this type ...

Страница 53: ...n 3DES is recommended because it is more secure and both sides must use the same Encryption method Authentication There are two methods of authentication MD5 and SHA The Authentication method determines a method to authenticate the ESP packets MD5 is a one way hashing algorithm that produces a 128 bit digest SHA is a one way hashing algorithm that produces a 160 bit digest SHA is recommended becau...

Страница 54: ...se 1 SA Life Time This field allows you to configure the length of time a VPN tunnel is active in Phase 1 The default value is 28 800 seconds Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will generate a new key material for IP traffic encryption and authentication If PFS is enabled a hacker using brute force to break encryption keys is not able to obtain other or future IPSec ...

Страница 55: ...de Aggressive Mode requires half of the main mode messages to be exchanged in Phase 1 of the SA exchange If network security is preferred select Main mode When users select the Dynamic IP in Remote Security Gateway Type it will be limited as Aggressive Mode Compress Support IP Payload compression Protocol IP Comp The Router supports IP Payload Compression Protocol IP Payload Compression is a proto...

Страница 56: ...ically from 1 30 See Figure 6 45 Tunnel Name Once the tunnel is enabled enter the Tunnel Name field such as Sales Name This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel Interface Select the Interface from the pull down menu When dual WAN is enable there will be two options WAN1 and WAN2 Enable Check the box to enable VPN Group...

Страница 57: ...r the Domain Name for Authentication the Domain Name must be same as the Remote Security Gateway of the remote VPN device The same Domain Name can be used only for one tunnel connection and users can t use the same Domain Name to create a new tunnel connection Dynamic IP E mail Addr USER FQDN Authentication If the Local Security Gateway has a dynamic IP select this type When the Remote Security Ga...

Страница 58: ...ess of the client user with VPN software that supports IPSec at the other end of the tunnel Dynamic IP Domain Name FQDN Authentication If you select this type the Remote Security Gateway will be a dynamic IP so you don t need to enter the IP address When the Remote Security Gateway requests to create a tunnel with the RV042 the RV042 will work as a responder If you select this type just enter the ...

Страница 59: ...d to encrypt decrypt ESP packets DES is 56 bit encryption and 3DES is 168 bit encryption 3DES is recommended because it is more secure and both sides must use the same Encryption method Authentication There are two methods of authentication MD5 and SHA The Authentication method determines a method to authenticate the ESP packets MD5 is a one way hashing algorithm that produces a 128 bit digest SHA...

Страница 60: ... 160 bit digest SHA is recommended because it is more secure and both sides must use the same Authentication method Phase 1 SA Life Time This field allows you to configure the length of time a VPN tunnel is active in Phase 1 The default value is 28 800 seconds Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will generate a new key material for IP traffic encryption and authentica...

Страница 61: ...mmended to select Null to disable authenticating ESP packets in Phase 2 but both sides of the tunnel must use the same setting Phase 2 SA Life Time This field allows you to configure the length of time a VPN tunnel is active The default value is 3 600 seconds Preshared Key Character and hexadecimal values are acceptable in this field e g My_ 123 or 4d795f40313233 The max entry of this field is 30 ...

Страница 62: ... of IP datagrams If Compress is enabled the Router will propose compression when initiating a connection If the responders reject this propose the Router will not implement the compression When the Router works as a responder the Router will always accept compression even without enabling compression Keep Alive This mechanism helps to keep up the connection of IPSec tunnels Whenever a connection i...

Страница 63: ...tton when you finish the VPN Pass Through settings or click the Cancel Changes button to undo the changes Log Tab System Log System Log There are three parts in System Log Syslog E mail and Log Setting See Figure 50 Syslog Enable Syslog If you check the box Syslog will be enabled Syslog Server In addition to the standard event log the Router can send a detailed log to an external Syslog server Sys...

Страница 64: ...Click the E mail Log Now button to immediately send the log to the address in the Send E mail to field Log Setting Alert Log You can receive alert logs for the following events Check the box for the desired event Syn Flooding IP Spoofing Win Nuke Ping of Death and Unauthorized Login Attempt General Log You can receive alert logs for the following events Check the box for the desired event System E...

Страница 65: ...eived and Dropped Packets Received for LAN WAN1 and WAN2 See Figure 6 51 Wizard Tab Use this tab to access two Setup Wizards the Basic Setup Wizard and the Access Rule Setup Wizard They will help you to set up the Router to access the Internet and set up a Firewall security policy The wizard will guide you through a series of menus to configure your Router See Figure 6 50 Basic Setup 1 Click the L...

Страница 66: ...t and domain name If your ISP requires them enter the Host Name in the field and the Domain Name in the field Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 4 The next screen Figure 6 53 is for selecting the WAN or Internet Connection Type for your WAN1 Internet port Select Obtain an IP automatically Static IP or PPPoE d...

Страница 67: ... want to return to the previous screen Click Exit if you want to exit the wizard If you chose Static IP Figure 6 55 appears Enter the Static IP Subnet Mask and Default Gateway provided by your ISP Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard If you chose PPPoE Figure 6 56 appears Enter the User Name and Password provid...

Страница 68: ...u want to return to the previous screen Click Exit if you want to exit the wizard 7 The next screen that appears depends on your WAN or Internet Connection Type selection for your WAN2 port If you chose Obtain an IP automatically Figure 6 58 appears Select Use DNS Server provided by ISP default or Use the Following DNS Server Addresses if you want to enter a specific IP Click Next to continue Clic...

Страница 69: ... if you want to return to the previous screen Click Exit if you want to exit the wizard If you chose PPPoE Figure 6 60 appears Enter the User Name and Password provided by your ISP Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 8 The final screen that appears is Figure 6 61 If you don t need to make any changes click Sav...

Страница 70: ...3 The next screen to appear is shown in Figure 6 63 Select Allow or Deny for the action Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 4 The next screen to appear is shown in Figure 6 64 Select the service from the drop down menu that will be allowed or denied from the Service menu Click Next to continue Click Previous i...

Страница 71: ...6 Select the Source from the Ethernet drop down menu Then select the users from the drop down menu Any single or Range Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 7 The next screen to appear is Figure 6 67 Select the destination either Any Single or Range from the drop down menu Click Next to continue Click Previous i...

Страница 72: ...ek Click Next to continue Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard 9 The final screen that appears is Figure 6 69 If you don t need to make any changes click Save Settings Click Previous if you want to return to the previous screen Click Exit if you want to exit the wizard The screen in Figure 6 70 will appear when the settings are corre...

Страница 73: ...click Downloads for this Product Click User Guide Linksys Web Site Click the Linksys Web Site button and it will link to the Support page of the Linksys Web Site www linksys com Logout Tab The Logout tab is located on the upper left corner of the Web Interface Clicking this tab will terminate the management session After you click the Logout tab you will be asked to confirm that you want to termin...

Страница 74: ...CP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Ethernet adapter Highlight it and click the Properties button C In the TCP IP properties window select the IP address tab and select Specify an IP address Enter a unique IP address that is not used by any other computer on the network connected to ...

Страница 75: ...d For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 A Click Start and Control Panel B Click the Network and Internet Connections icon and then the Network Connections icon C Right click the Local Ar...

Страница 76: ...ection Properties window 5 Restart the computer if asked 6 Click the OK button in the Internet Protocol TCP IP Properties window and click the OK button in the Local Area Connection Properties window 7 Restart the computer if asked For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus ...

Страница 77: ... a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 3 I am not getting an IP address on the Internet with my Internet connection A Refer to Problem 2 I want to test my Internet connection to verify that you have connectivity B If you need to register the MAC address of your Ethernet adapter with your IS...

Страница 78: ...imitations due to occasional incompatibility with the NAT standard Change the IP address for the Router to another subnet to avoid a conflict between the VPN IP address and your local IP address For example if your VPN server assigns an IP address 192 168 1 X X is a number from 1 to 254 and your local LAN IP address is 192 168 1 X X is the same number used in the VPN IP address the Router will hav...

Страница 79: ...many entries as you like When you have completed the configuration click the Save Settings button 7 I need to set up online game hosting or use other Internet applications If you want to play online games or use Internet applications most will work without doing any port forwarding or DMZ hosting There may be cases when you want to host an online game or Internet application This would require you...

Страница 80: ...sable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the forwarding settings If the port number that the data enters from does not have port forwarding then the Router will send the data to whichever PC or network device you set for DMZ hosting Follow these ste...

Страница 81: ... gain access Please follow these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the LAN For Microsoft Internet Explorer 5 0 or higher A Click Start Settings and Control Panel Double click Internet Options B Click the Connections tab C Click the LAN settings button and remove anything that is checked D Click the OK button to g...

Страница 82: ...em 1 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 C Perform the upgrade using the TFTP utility If the firmware upgrade failed the Router will still work using its current firmware If you want to use a backup firmware version go to System Management Restart Select Backup F...

Страница 83: ...ettings button to continue If your difficulties continue change the Size to different values Try this list of values one value at a time in this order until your problem is solved 1462 1400 1362 1300 16 I need to use port triggering Port triggering looks at the outgoing port services used and will trigger the Router to open a specific port depending on which port an Internet application uses Follo...

Страница 84: ...ns What is the maximum number of IP addresses that the Router will support The Router will support up to 253 IP addresses Is IPSec Passthrough supported by the Router Yes enable or disable IPSec Passthrough on the VPN VPN Pass Through tab Where is the Router installed on the network In a typical environment the Router is installed between the cable DSL modem and the LAN Plug the Router into the ca...

Страница 85: ... Can multiple gamers on the LAN get on one game server and play simultaneously with just one public IP address It depends on which network game or what kind of game server you are using For example Unreal Tournament supports multi login with one public IP How do I get Half Life Team Fortress to work with the Router The default client port for Half Life is 27005 The computers on your LAN need to ha...

Страница 86: ...uration screen for the Router What can I do You may have to remove the proxy settings on your Internet browser e g Netscape Navigator or Internet Explorer Or remove the dial up settings on your browser Check with your browser documentation and make sure that your browser is set to connect directly and that any dial up is disabled Make sure that your browser is set to connect directly and that any ...

Страница 87: ...e Router is compatible with virtually any cable or DSL modem that supports Ethernet What is the maximum number of VPN sessions allowed by the Router The maximum number depends on many factors At least one IPSec session will work through the Router however simultaneous IPSec sessions may be possible depending on the specifics of your VPNs How can I check whether I have static or DHCP IP addresses A...

Страница 88: ...e Linksys website www linksys com or click the Firmware Download from Linksys Web Site button Select the Router from the pull down menu and choose the firmware from the options 2 Extract the file on your computer 3 Click the System Management Tab and then the Firmware Upgrade page 4 On the Firmware Upgrade screen shown in Figure B 1 enter the location of the extracted firmware upgrade file or clic...

Страница 89: ...s the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure C 1 3 Write down the Adapter Address as shown on your computer screen see Figure C 2 This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is...

Страница 90: ... address cloning or MAC filtering The example in Figure C 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC address cloning enter the MAC Address in the User Defined WAN1 or WAN2 MAC Address field or select MAC Address from this PC See Figure C 4 Click Save Settings to save the MAC Cloning settings or cl...

Страница 91: ...er including the installation of the mounting brackets Setting up the Router You can set the Router on a desktop or mount it on the wall Placement of the Router Set the Router on a desktop or other flat secure surface Do not place excessive weight on top of the Router that could damage the Router If you want to wall mount the Router see Figure D 1 Figure D 1 Wall Mounting the Router ...

Страница 92: ... instructions or protocol all PCs follow to communicate over a wired or wireless network Your PCs will not be able to utilize networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folders or files over your network Windows Help provides complete instructions on utilizing shared resources Network Neighb...

Страница 93: ...work Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data...

Страница 94: ...ing of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of t...

Страница 95: ...ieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a networ...

Страница 96: ...a Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mIRC An Internet Relay Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local ar...

Страница 97: ...ed as a type of broadband connection in Europe Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to anoth...

Страница 98: ...t TCP Transmission Control Protocol A network protocol for transmitting data that requires acknowledgement from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol t...

Страница 99: ...Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protocol using TKIP T...

Страница 100: ...t DMZ Internet DMZ Mode Diag 1 4 UPnP able cert Yes Security Features SPI Firewall DES and 3DES Encryption for IPSec VPN Tunnel Dimensions 5 12 x 1 52 x 7 87 W x H x D 130 mm x 38 5 mm x 200 mm Unit Weight 20 oz 0 58 kg Power Input 120V 60Hz Output 12V DC 1A Certifications FCC Class B CE Class B Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 0ºC to 70ºC 32ºF to 158ºF Operating Humidity 10 t...

Страница 101: ...AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b h...

Страница 102: ...g the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equip...

Страница 103: ...king with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department fo...

Отзывы: