4-Port Gigabit Security Router with VPN User Guide Model: RVS4000 BUSINESS SERIES
Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. Open Source This product may contain material licensed to you under the GNU General Public License or other open-source software licenses.
Table of Contents Chapter 1: Introduction 1 Chapter 2: Networking and Security Basics 2 An Introduction to LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Use of IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Intrusion Prevention System (IPS) . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents QoS > QoS Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 QoS > DSCP Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Administration > Management . . . . . .
Table of Contents How to Establish a Secure IPSec Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Step 1: Create an IPSec Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Step 2: Build Filter Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Step 3: Configure Individual Tunnel Rules . . . . . . . . . . .
Table of Contents Avis d’Industrie Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Appendix I: Software License Agreement 69 Software in Linksys Products: . . . . . . . . . . . . . . . . . . . . .
Chapter 1 Introduction Chapter 1: Introduction Thank you for choosing the 4-Port Gigabit Security Router with VPN. The Linksys 4-Port Gigabit Security Router with VPN is an advanced Internet-sharing network solution for your small business needs. Like any router, it lets multiple computers in your office share an Internet connection.
Chapter 2 Networking and Security Basics Chapter 2: Networking and Security Basics and its dynamic IP address has expired, the DHCP server will assign it a new dynamic IP address. An Introduction to LANs The PC or network device obtaining an IP address is called the DHCP client. DHCP frees you from having to assign IP addresses manually every time a new user is added to your network. A Router is a network device that connects two networks together.
Chapter 2 Networking and Security Basics client PCs and servers running various operating systems including Windows, Linux, and Solaris from network worm attacks. However, this system does not prevent viruses contained in email attachments. The P2P (peer-to-peer) and IM (instant messaging) control allows the system administrator to prevent network users from using those protocols to communicate with people over the Internet.
Chapter 3 Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? Computer networking provides a flexibility not available when using an archaic, paper-based system. With this flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network.
Planning Your Virtual Private Network (VPN) Chapter 3 VPN tunnel using IPSec (refer to “Appendix C: Configuring IPSec between a Windows 2000 or XP PC and the Router”). Other versions of Microsoft operating systems require additional, third-party VPN client software applications that support IPSec to be installed. VPN Router to VPN Router For additional information and instructions about creating your own VPN, please visit Linksys’s website at www.linksys.com.
Product Overview Chapter 4 Chapter 4: Product Overview Back Panel The Router’s ports and Reset button are located on the back panel of the Router. Front Panel The Router’s LEDs are located on the front panel of the Router. Back Panel RESET The Reset button can be used in one of two ways: Front Panel POWER (Green) The Power LED lights up when the Router is powered on. If the LED is flashing, the Router is running a diagnostic test. DIAG (Red) The Diag LED lights up when the system is not ready.
Chapter 5 Setting Up and Configuring the Router Chapter 5: Setting Up and Configuring the Router Setup The router is configured using the built-in Web-based Utility. To access the Web-based Utility of the Router, open your web browser and enter http://192.168.1.1 into the Address field. Press the Enter key and the Login screen will appear. The Setup tab is used to access all of the Router’s basic setup functions.
Chapter 5 Setting Up and Configuring the Router Network Setting Status Automatic Configuration - DHCP LAN IP Displays the IP address of the Router’s LAN interface. By default, the Router’s Configuration Type is set to Automatic Configuration - DHCP, and it should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. WAN IP Displays the IP address of the Router’s WAN interface.
Setting Up and Configuring the Router Chapter 5 When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. PPPoE Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE.
Chapter 5 Setting Up and Configuring the Router Heart Beat Signal Heart Beat Signal is a service used in Australia. Check with your ISP for the necessary setup information. L2TP Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server Enter the IP address of the Heart Beat server.
Chapter 5 Setting Up and Configuring the Router Optional Settings (Required by some ISPs) •• Password Some of these settings may be required by your ISP. Verify with your ISP before making any changes. •• Host Name (DynDNS) or Domain name (TZO) •• Custom DNS (DynDNS) 4. Click Save Settings. The Router will now advise the DDNS Service of your current WAN (Internet) IP address whenever this address changes. If using TZO, you should NOT use the TZO software to perform this “IP address update”.
Chapter 5 Setting Up and Configuring the Router Server Settings (DHCP) IPv6 The Router can be used as your network’s DHCP (Dynamic Host Configuration Protocol) server, which automatically assigns an IP address to each PC on your network. Unless you already have one, it is highly recommended that you leave the Router enabled as a DHCP server. IPv6 Address If your network has implemented IPv6, enter the proper IPv6 address in this field. DHCP Server DHCP is already enabled by factory default.
Chapter 5 Setting Up and Configuring the Router Click Save Settings to save your changes, or click Cancel Changes to undo your changes. Operating Mode Setup > MAC Address Clone Some ISPs require that you register a MAC address. This feature “clones” your network adapter’s MAC address onto the Router, and prevents you from having to call your ISP to change the registered MAC address to the Router’s MAC address.
Chapter 5 Setting Up and Configuring the Router Destination IP Address Enter the network address of the remote LAN segment. For a standard Class C IP domain, the network address is the first three fields of the Destination LAN IP, while the last field should be zero. Set the local time using Network Time Protocol (NTP) Automatically If you wish to use a Network Time Protocol server to set the time and date, select this option, then complete the following fields.
Chapter 5 Firewall Setting Up and Configuring the Router •• Single IP Address Allows access from the single IP address that you enter in the field provided. From the Firewall Tab, you can configure the Router to deny or allow specific internal users from accessing the Internet. You can also configure the Router to deny or allow specific Internet users from accessing the internal servers.
Chapter 5 Setting Up and Configuring the Router Editing IP ACL Rules Firewall > IP Based ACL Priority This is the rule’s priority. Enable This indicates whether the rule is enabled or disabled. Action. This is the rule’s action, either Allow or Deny. Service This is the service(s) to which the rule applies. Source Interface This is the source interface, either WAN, LAN, or ANY.
Chapter 5 Setting Up and Configuring the Router Time To make the rule apply for an entire day, select 24 Hours. To make the rule apply only during a specific period of the day, enter the starting time in the From field and the ending time in the To field. Click Save Settings to save your settings. Click Cancel Changes to cancel your changes. Click Return to return to the IP-Based ACL screen.
Chapter 5 policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. If you wish to block access to Web sites, use the Website Blocking by URL Address or Website Blocking by Keyword feature. •• Website Blocking by URL Address. Enter the URL or Domain Name of the web sites you wish to block. •• Website Blocking by Keyword.
Chapter 5 Setting Up and Configuring the Router Enabled Click the Enabled checkbox to enable port range forwarding for the relevant application. VPN Click Save Settings to save the settings you have entered. Click Cancel Changes to cancel any changes you have entered. VPN > Summary Firewall > Port Range Triggering VPN > Summary Tunnels Used Displays the number of tunnels used. Tunnel(s) Available Displays the number of available tunnels.
Chapter 5 Setting Up and Configuring the Router Tunnel(s) Defined Displays the number of tunnels currently defined. This number will be greater than the Tunnels Enabled field if any defined tunnels have been disabled. Select Tunnel Entry To create a new tunnel, select new. To configure an existing tunnel, select it from the dropdown menu. VPN Clients Status No. Displays the user number from 1 to 5. Username. Displays the username of the VPN Client.
Chapter 5 Remote Security Group Type Select the remote LAN user(s) behind the remote gateway who can use this VPN tunnel. This may be a single IP address or a Sub-network. Note that the Remote Security Group Type must match the other router’s Local Security Group Type. IP Address Enter the IP address on the remote network. Subnet Mask If the Remote Security Group Type is set to Subnet, enter the mask to determine the IP addresses on the remote network.
Chapter 5 Setting Up and Configuring the Router VPN > VPN Client Accounts Certificate Management Use this page to administer your VPN Client users. Enter the information at the top of the screen and the users you’ve entered will appear in the list at the bottom, showing their status. This will work with the Linksys QuickVPN client only. (The Router supports up to five Linksys QuickVPN Clients by default. Additional QuickVPN Client licenses can be purchased separately. See www.linksys.
Chapter 5 Setting Up and Configuring the Router L2TP PassThrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. L2TP Passthrough is enabled by default. To disable L2TP Passthrough, select Disabled. Direction Select Upstream for outbound traffic or Downstream for inbound traffic. Click Save Settings to save your settings. Click Cancel Changes to cancel any changes you have entered. QoS Mini.
Chapter 5 Setting Up and Configuring the Router Administration The Administration tab provides access to system administration settings and tools. It includes the following screens: Administration > Management QoS > QoS Setup Port ID The number of the LAN port. Trust Mode Select either Port, CoS, or DSCP. The default is Port. Default CoS/Port Priority If Trust Mode is set to Port, select the port priority from 1 to 4 from the drop-down menu.
Chapter 5 Setting Up and Configuring the Router UPnP Outgoing Log Select Enable to cause all outgoing packets to be logged. You can then click View Outgoing Table to display information on the outgoing packets including Source IP, Destination IP, and Service/Port number. Universal Plug and Play (UPnP) can used to set up public services on your network. When the UPnP function is enabled, Windows XP can add or delete entries to the underlined UPnP Forwarding Table.
Chapter 5 Setting Up and Configuring the Router Administration > Diagnostics Administration > Backup & Restore Administration > Backup & Restore To download a copy of the current configuration and store the file on your PC, click Backup to start the download. Restore Configuration Administration > Diagnostics Ping Test Parameters Ping Target IP Enter the IP address or URL that you want to ping.
Chapter 5 Setting Up and Configuring the Router Administration > Firmware Upgrade Signature Update Before upgrading the firmware, download and extract the Router firmware upgrade file from the Linksys website, www.linksys.com. Enter the firmware upgrade file name in the Signature Update field, or click Browse to find the file. Then click Update and follow the on-screen instructions.
Chapter 5 Setting Up and Configuring the Router L2 Switch L2 > Create VLAN VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a hardware solution. VLANs combine user stations and network devices into a single domain regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups. VLANs managed through software reduce the amount of time in which network changes are implemented.
Chapter 5 Setting Up and Configuring the Router L2 > VLAN Port Setting Function/Port table The top half of the table indicates each port’s current mode (Untagged, Tagged, or Trunk). The lower half of the table is used to assign port membership for the selected VLAN. The default for each port is Exclude (the port is not a member of the VLAN). To make a port a member of the VLAN, select the applicable mode(s).
Chapter 5 Setting Up and Configuring the Router L2 > Port Setting Rx Frames Displays the number of Frames received on the selected port. Tx Errors Displays the number of error packets transmitted from the selected port. Rx Errors Displays the number of error packets received from the selected port. L2 > Port Mirroring L2 Switch > Port Setting Port Displays the physical port number. Link Displays the port duplex mode and speed.
Chapter 5 Setting Up and Configuring the Router Forward Delay Enter a number from 4 to 30. The default is 15. DNS 1-2 Displays the DNS (Domain Name System) IP addresses currently used by this Gateway. Force Version This is the default protocol version to use. Select Normal (use RSTP) or Compatible (compatible with old STP). The default is Normal. IP Conntrack Click this button to display the IP Conntrack screen. Protocol Enable Check this box to enable RSTP on the associated port.
Chapter 5 Setting Up and Configuring the Router DHCP Server The status of the Router’s DHCP server function is displayed here. Start IP Address This shows the beginning of the range of IP addresses used by the DHCP Server. End IP Address This shows the end of the range of IP addresses used by the DHCP Server. DHCP Client Table Clicking this button will open a screen showing you which PCs are utilizing the Router as a DHCP server.
Troubleshooting Appendix A Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com. I need to set a static IP address on a PC. The Router, by default, assigns an IP address range of 192.168.1.100 to 192.168.1.149 using the DHCP server on the Router.
Troubleshooting Appendix A I want to test my Internet connection. 1. Check your TCP/IP settings. Windows 98 and Millennium Refer to Windows Help for details. Make sure Obtain IP address automatically is selected in the settings. Windows 2000 •• If you do NOT get a reply, check the cable, and make sure Obtain an IP address automatically is selected in the TCP/IP settings for your Ethernet adapter. 4. At the command prompt, type ping followed by your Internet IP address and press Enter.
Troubleshooting Appendix A I am not able to access the Router’s Web-based Utility Setup page. 1. Refer to “I want to test my Internet connection” above to verify that your computer is properly connected to the Router. 2. Verify that your computer has an IP Address, Subnet Mask, Gateway, and DNS. 3. Set a static IP address on your system; refer to “I need to set a static IP address” above. 4. Refer to “I need to remove the proxy settings or the dial-up pop-up window (for PPPoE users)” below.
Troubleshooting Appendix A 2. Select the Service from the Application column. 3. Enter the IP Address of the server that you want the Internet users to access. For example, if the web server’s Ethernet adapter IP address is 192.168.1.100, you would enter 100 in the field provided. Then check the Enable checkbox for the entry. Consider the examples below: I forgot my password, or the password prompt always appears when saving settings to the Router.
Troubleshooting Appendix A I need to upgrade the firmware. 4. Click Save Settings. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: If the connection is lost again, follow steps 1 and 2 to reestablish connection. 1. Go to the Linksys website at www.linksys.com and download the latest firmware.
Appendix A 7. Check the Enabled checkbox for the entry. When you have completed the configuration, click Save Settings. When I enter a URL or IP address, I get a time-out error or am prompted to retry. •• Check if other PCs work. If they do, ensure that your workstation’s IP settings are correct (IP Address, Subnet Mask, Default Gateway, and DNS). Restart the computer that is having a problem. •• If the PCs are configured correctly, but still not working, check the Router.
Appendix A Does the Router support any operating system other than Windows 98, Millennium, 2000, or XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems. Does the Router support ICQ send file? Yes, with the following fix: click ICQ menu => preference => connections tab=>, and check I am behind a firewall or proxy. Then set the firewall time-out to 80 seconds in the firewall setting.
Appendix A Troubleshooting What is DMZ Hosting? Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if you want to use DMZ Hosting. If DMZ Hosting is used, does the exposed user share the public IP with the Router? No. Does the Router pass PPTP packets or actively route PPTP sessions? The Router allows PPTP packets to pass through.
Appendix B Using Linksys QuickVPN for Windows 2000, XP, or Vista Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista Overview This appendix explains how to install and use the Linksys QuickVPN software that can be downloaded from www. linksys.com. QuickVPN works with computers running Windows 2000, XP, or Vista. (Computers using other operating systems will have to use third-party VPN software.) For Windows Vista, QuickVPN Client version 1.2.5 or later is required.
Using Linksys QuickVPN for Windows 2000, XP, or Vista Appendix B 6. Save the zip file to your PC, and extract the .exe file. 7. Double-click the .exe file, and follow the on-screen instructions. Proceed to the next section, “Using the Linksys QuickVPN Software”. QuickVPN Tray Icon— Connection Using the Linksys QuickVPN Software 1. Double-click the Linksys QuickVPN software icon on your desktop or in the system tray. QuickVPN Desktop Icon QuickVPN Tray Icon— No Connection 2.
Appendix B Using Linksys QuickVPN for Windows 2000, XP, or Vista QuickVPN Client Version Number Distributing Certificates to QuickVPN Users The following explains how to export a certificate from the RVS4000 for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users’ PCs. 1. Generate the Certificate as follows: a. Log on to the Web-based Utility. b. Select VPN, then VPN Client Accounts. c. Click Generate to generate a new certificate. d.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer Appendix C: Configuring IPSec with a Windows 2000 or XP Computer How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click Start, select Run, and type secpol.msc in the Open field. The Local Security Settings screen appears. Introduction This appendix explains how to establish a secure IPSec tunnel using preshared keys to join a private network inside the Router and a Windows 2000 or XP computer.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer 2. Make sure the IP Filter List tab is selected. Click Add. mask 255.255.255.0. (These are the Router’s default settings. If you have changed these settings, enter your new values.) 5. If you want to enter a description for your filter, click the Description tab and enter the description there. 6. Click OK. Then, click OK or Close in the IP Filter List window. Filter List 2: router -> win IP Filter List Tab 7.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer 2. Click the Filter Action tab, and click the filter action Require Security radio button. Then, click Edit. Filters Properties 10. If you want to enter a description for your filter, click the Description tab and enter the description there. 11. Click OK or Close and the New Rule Properties screen appears with the IP Filter List tab selected. The screen will contain listings for Router->win and win->Router.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer Connection Type Tab Preshared Key Tunnel 2: Router->win 6. This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step. 9. In the new policy’s Properties screen, make sure that win -> Router is selected and deselect the Use Add Wizard check box. Then, click Add to create the second IP filter. New Preshared Key Properties Screen 7.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer Filter Action Tab New Preshared Key 12. Click the Authentication Methods tab, and verify that the authentication method Kerberos is selected. Then, click Edit. 15. Click the Tunnel Setting tab. Click the radio button The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer’s IP Address. Authentication Methods Tab Tunnel Setting Tab 13.
Appendix C Configuring IPSec with a Windows 2000 or XP Computer Step 4: Assign New IPSec Policy In the IP Security Policies on Local Machine window, rightclick the policy named to_Router, and click Assign. A green arrow appears in the folder icon. the name of the tunnel in the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. 5.
Gateway-to-Gateway VPN Tunnel Appendix D Appendix D: Gateway-to-Gateway VPN Tunnel Overview This appendix explains how to configure an IPSec VPN tunnel between two VPN Routers by example. Two computers are used to test the liveliness of the tunnel. Configuration of the RVS4000 Follow these instructions for the first VPN Router, designated RVS4000. The other VPN Router is designated the RV082. 1. Launch the web browser for a networked computer, designated PC 1. 2.
Appendix D Gateway-to-Gateway VPN Tunnel 10. In the IPSec Setup section, select the appropriate encryption, authentication, and other key management settings. 8. For the Remote Security Gateway Type, select IP address. Enter the RVS4000’s WAN IP address in the IP Address field. 11. In the Preshared Key field, enter a string for this key, for example, 13572468. 9. For the Remote Security Group Type, select Subnet. Enter the RVS4000’s local network settings in the IP Address and Subnet Mask fields. 10.
Gateway-to-Gateway VPN Tunnel Appendix D Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP.” RV082 Dynamic IP: B.B.B.B with Domain Name: www.abc.com LAN: 192.168.1.1 RVS4000 WAN: A.A.A.A LAN: 192.168.5.1 RVS4000 IPSec VPN Settings 8. For the Remote Security Gateway Type, select IP by DNS Resolved.
Appendix D 6. For the VPN Tunnel setting, select Enable. 7. The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Subnet Mask fields. Gateway-to-Gateway VPN Tunnel Configuration when Both Gateways Use Dynamic IP Addresses This example assumes both Gateways are using dynamic IP addresses.
Appendix D Gateway-to-Gateway VPN Tunnel 6. For the VPN Tunnel setting, select Enable. 7. The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Subnet Mask fields. RVS4000 IPSec VPN Settings 8. For the Remote Security Gateway Type, select IP by DNS Resolved. Enter the RV082’s domain name in the field provided. 9. For the Remote Security Group Type, select Subnet.
Appendix E Appendix E: Trend Micro ProtectLink Gateway Service Trend Micro ProtectLink Gateway Service How to Purchase, Register, or Activate the Service You can purchase, register, or activate the service using the ProtectLink screen. ProtectLink Overview The optional Trend Micro ProtectLink Gateway service provides security for your network. It checks e-mail messages, filters website addresses (URLs), and blocks potentially malicious websites.
Appendix E When the wizard is complete, the Web Protection, Email Protection, and License tabs will appear. NOTE: If you replace the Router with a new router that supports this service, click I have my Activation Code (AC) and want to activate ProtectLink Gateway. Then use your current activation code to transfer your license for the ProtectLink service to the new router.
Appendix E Trend Micro ProtectLink Gateway Service URL(s) to approve Enter the trusted URL(s). Separate multiple URLs with semicolons (“;”). Add To add the URLs, click Add. Approved URLs list The trusted URLs are displayed. To delete a URL, click its trash can icon. Approved Clients You can designate up to 20 trusted clients (local IP addresses) that will always have access to filtered URLs. Enable Approved Client list To set up a list of trusted clients, select this option.
Appendix E Trend Micro ProtectLink Gateway Service ProtectLink > License License Update Information To refresh the license information displayed on-screen, click Update Information. License Information View detailed license online To view license information online, click this link. Status The status of your license, Activated or Expired, is displayed. Platform The platform type, Gateway Service, is automatically displayed. License expires on The date and time your license expires are displayed.
Appendix E 4-Port Gigabit Security Router with VPN Trend Micro ProtectLink Gateway Service 59
Specifications Appendix F Appendix F: Specifications Specifications Secure Management HTTPS, Username/Password 802.1X Port-based RADIUS Authentication (EAP-MD5, EAP-PEAP) Model RVS4000 Standards IEEE 802.3, 802.3u, 802.1x, RFC791 (IP Protocol), RFC2460 Ports Ethernet, Power QoS Buttons Reset Service-based Cabling Type UTP CAT 5 LEDs Power, Diag, IPS, LAN 1-4, Internet Service-based Bandwidth Management supports Rate Control and Priority Prioritization Types 802.
Appendix F Specifications Environmental Dimensions WxHxD 6.69" x 1.61" x 6.69" (170 x 41 x 170 mm) Unit Weight 0.84 lb (0.38 kg) Power 12V 1A Certification FCC Class B, CE, ICES-003 Operating Temp. 32 to 104ºF (0 to 40ºC) Storage Temp. -4 to 158ºF (-20 to 70ºC) Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice.
Appendix G Appendix G: Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified for this product at www.linksys.com/warranty. The internet URL address and the web pages referred to herein may be updated by Linksys from time to time; the version in effect at the date of purchase shall apply.
Appendix G Warranty Information original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix H Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Appendix H User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix H Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix H Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix H Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix I Appendix I: Software License Agreement Software in Linksys Products: This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix I your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulato
Appendix I Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
Appendix I c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix I License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royaltyfree redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
Appendix I Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix I Software License Agreement THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY O
Appendix J Contact Information Appendix J: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.