USER GUIDE Wireless-N Gigabit Security Router with VPN with Ports 4-portuter Model No. WRVS4400N Wireless ModelModel No. No.
Wireless-N Gigabit Security Router with VPN Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2006 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Wireless-N Gigabit Security Router with VPN Table of Contents Chapter 1: Introduction 1 Welcome What’s in this Guide? 1 2 Chapter 2: Networking and Security Basics 4 An Introduction to LANs The Use of IP Addresses The Intrusion Prevention System (IPS) 4 5 7 Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? What is a VPN? Chapter 4: Getting to Know the Router The Front Panel The Back Panels Antennas and Positions Chapter 5: Connecting the Router Overview Connection Instru
Wireless-N Gigabit Security Router with VPN Common Problems and Solutions Frequently Asked Questions Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP Overview Before You Begin Installing the Linksys QuickVPN Software Using the Linksys QuickVPN Software Appendix C: Configuring a Gateway-to-Gateway IPSec Tunnel Overview Before You Begin Configuring the VPN Settings for the VPN Routers Configuring the Key Management Settings Configuring PC 1 and PC 2 Appendix D: Finding the MAC Addres
Wireless-N Gigabit Security Router with VPN List of Figures Figure 2-1: Example network Figure 2-2: IPS Scenarios Figure 3-1: VPN Router to VPN Router Figure 3-2: Computer to VPN Router Figure 4-1: Front Panel Figure 4-2: Back Panel Figure 4-3: Stackable Position and its Antenna Setup Figure 4-4: Standalone Position and its Antenna Setup Figure 5-1: Example of a Typical Network Figure 5-2: Connect a PC Figure 5-3: Connect the Internet Figure 5-4: Connect the Power Figure 5-5: The Stand Option Figure 5-6: S
Wireless-N Gigabit Security Router with VPN Figure 6-11: Setup - LAN Figure 6-12: Setup - DMZ Figure 6-13: Setup - MAC Address Clone Figure 6-14: Setup - Advanced Routing Figure 6-15: Setup - Advanced Routing (Routing Table) Figure 6-16: Setup - Time Figure 6-17: Wireless - Basic Wireless Settings Figure 6-18: Wireless - Wireless Security (Disabled) Figure 6-19: Wireless - Wireless Security (WPA-Personal) Figure 6-20: Wireless - Wireless Security (WPA2-Personal) Figure 6-21: Wireless - Wireless Security (W
Wireless-N Gigabit Security Router with VPN Figure 6-41: VPN - IPsec VPN Figure 6-42: VPN Tunnel Summary Figure 6-43: View VPN Tunnel Log Figure 6-44: IPsec VPN Advanced Settings Figure 6-45: VPN - VPN Client Accounts Figure 6-46: VPN - VPN Passthrough Figure 6-47: QoS - Application Based Figure 6-48: Port-based Figure 6-49: Administration - Management Figure 6-50: Administration - Log Figure 6-51: View Log pop-up window Figure 6-52: Administration - Diagnostics Figure 6-53: Ping Test Screen Figure 6-54: T
Wireless-N Gigabit Security Router with VPN Figure 6-71: LAN DHCP Client Table Figure 6-72: LAN ARP Table Figure 6-73: Status - Wireless LAN Figure 6-74: Status - System Performance Figure 6-75: Status - VPN Clients Figure 6-76: Status - IPsec VPN Figure B-1: VPN Client Accounts Screen Figure B-2: QuickVPN Desktop Icon Figure B-3: QuickVPN Tray Icon - No Connection Figure B-4: QuickVPN Software - Profile Figure B-5: Connecting Figure B-6: Activating Policy Figure B-7: Verifying Network Figure B-8: QuickVPN
Wireless-N Gigabit Security Router with VPN Chapter 1: Introduction Welcome Thank you for choosing the Wireless-N Gigabit Security Router with VPN. The Wireless-N Gigabit Security Router with VPN is an advanced Internet-sharing network solution for your small business needs. The Router features a built-in 4-Port full-duplex 10/100/1000 Ethernet switch to connect four PCs directly, or you can connect more hubs and switches to create as big a network as you need.
Wireless-N Gigabit Security Router with VPN What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-N Gigabit Security Router with VPN. • Chapter 1: Introduction This chapter describes the Wireless-N Gigabit Security Router with VPN applications and this User Guide. • Chapter 2: Networking and Security Basics This chapter describes the basics of networking and network security.
Wireless-N Gigabit Security Router with VPN • Appendix F: Specifications This appendix provides the technical specifications for the Router. • Appendix G: Warranty Information This appendix supplies the warranty information for the Router. • Appendix H: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support.
Wireless-N Gigabit Security Router with VPN Chapter 2: Networking and Security Basics An Introduction to LANs A Router is a network device that connects multiple networks together and forward traffic based on IP destination of each packet. The Wireless-N Gigabit Security Router can connect your local area network (LAN) or a group of PCs interconnected in your home or office to the Internet.
Wireless-N Gigabit Security Router with VPN Figure 2-1: Example network The Use of IP Addresses IP stands for Internet Protocol. Every device in an IP-based network, including PCs, print servers, and routers, requires an IP address to identify its location, or address, on the network. This applies to both the Internet and LAN connections. There are two ways of assigning IP addresses to your network devices.
Wireless-N Gigabit Security Router with VPN A static IP address is a fixed IP address that you assign manually to a PC or other device on the network. Since a static IP address remains valid until you disable it, static IP addressing ensures that the device assigned it will always have that same IP address until you change it. Static IP addresses are commonly used with dedicated network devices such as server PCs or print servers.
Wireless-N Gigabit Security Router with VPN The Intrusion Prevention System (IPS) 1000+ Figure 2-2: IPS Scenarios IPS is an advanced technology to protect your network from malicious attacks. IPS works together with your SPI Firewall, IP Based Access List (IP ACL), Network Address Port Translation (NAPT), and Virtual Private Network (VPN) to achieve the highest amount of securities. IPS works by providing real-time detection and prevention as an in-line module in a router.
Wireless-N Gigabit Security Router with VPN The P2P (peer to peer) and IM (instant messaging) control allows the system administrator to prevent network users from using those protocols to communicate with people over the Internet. This helps the administrators to set up company policies on how to use their Internet bandwidth wisely. The signature file is the heart of the IPS system. It is similar to the Virus definition files on your PC’s Anti-Virus programs.
Wireless-N Gigabit Security Router with VPN Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? Computer networking provides a flexibility not available when using an archaic, paper-based system. With this flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network.
Wireless-N Gigabit Security Router with VPN data to a new destination. Even though the data is not received by its intended recipient, it appears that way to the person sending the data. These are only a few of the methods hackers use and they are always developing more. Without the security of your VPN, your data is constantly open to such attacks as it travels over the Internet.
Wireless-N Gigabit Security Router with VPN to create a VPN tunnel using IPsec (refer to “Appendix C: Configuring IPsec between a Windows 2000 or XP PC and the Router”). Other versions of Microsoft operating systems require additional, third-party VPN client software applications that support IPsec to be installed. VPN Router to VPN Router An example of a VPN Router-to-VPN Router VPN would be as follows. At home, a telecommuter uses his VPN Router for his always-on Internet connection.
Wireless-N Gigabit Security Router with VPN Chapter 4: Getting to Know the Router The Front Panel The Router’s LEDs are located on the front panel of the Router. Figure 4-1: Front Panel LEDs POWER Green. The POWER LED lights up when the Router is powered on. The LED flashes when the Router runs a diagnostic test.
Wireless-N Gigabit Security Router with VPN DIAG Red. The DIAG LED lights up when the system is not ready. The LED light goes off when the system is ready. The Diag LED blinks during Firmware upgrades. IPS Green/Red. The IPS LED lights up when the IPS function is enabled. The LED light is off when the IPS functions are disabled. The IPS LED flashes green when an external attack is detected. The IPS LED flashes red when an internal attack is detected. WIRELESS Green.
Wireless-N Gigabit Security Router with VPN The Back Panels The Router’s ports and Reset button are located on the back panel of the Router. Figure 4-2: Back Panel Reset Button The Reset button can be used in one of two ways: If the Router is having problems connecting to the Internet, press the Reset button for just a second with a paper clip or a pencil tip. This is similar to pressing the Reset button on your PC to reboot it.
Wireless-N Gigabit Security Router with VPN Antennas and Positions The Access Point can be placed in three different positions. It can be either stackable, standalone, or wall-mount. Antenna The Access Point has three non-detachable 2dBi omni-directional antennas. The three antennas have a base that can rotate 90 degrees when in the standing position. The three antennas will all be used to support 2X3 MIMO diversity in wireless-N mode.
Wireless-N Gigabit Security Router with VPN Chapter 5: Connecting the Router Overview To set up your network, you will do the following: • Connect the Router to one of your PCs according to the instructions in this chapter. • By default, Windows 98, 2000, Millennium, and XP computers are set to obtain an IP address automatically, so unless you have changed the default setting, then you will not need to configure your PCs. (If you do need to configure your PCs, refer to Windows Help for more information.
Wireless-N Gigabit Security Router with VPN Connection Instructions 1. Before you begin, make sure that all of your hardware is powered off, including the Router, PCs, hubs, switches, and cable or DSL modem. 2. Connect one end of an Ethernet network cable to one of the numbered ports on the back of the Router. Connect the other end to an Ethernet port on a network device, e.g., a PC, print server, hub, or switch. Repeat this step to connect more PCs or other network devices to the Router. 3.
Wireless-N Gigabit Security Router with VPN Placement Options There are three ways to place the Wireless-N Router. The first way is to place it horizontally on a surface, so it sits on its four rubber feet. The second way is to stand the Wireless Router vertically on a surface. The third way is to mount it on a wall. The stand and wall-mount options are explained in further detail below. Stand Option 1. Locate the Router’s left side panel. 2. The Router includes two stands.
Wireless-N Gigabit Security Router with VPN Wall-Mount Option You will need two suitable screws (See Figure 5-7) to mount the Router. Make sure the screw size can fit into the criss-cross wall-mount slots. 1. On the Wireless Router’s back panel are two criss-cross wall-mount slots. 2. Determine where you want to mount the Wireless Router, and install two screws that are 2-9/16 in (64.5mm) apart. 3. Line up the Wireless Router so that the wall-mount slots line up with the two screws.
Wireless-N Gigabit Security Router with VPN Chapter 6: Setting Up and Configuring the Router Overview The Wireless Router has been designed to be functional right out of the box with the default settings. However, if you'd like to change these settings, the Wireless Router can be configured through your web browser with the Web-based Utility. This chapter explains how to use the Utility to perform the most basic settings.
Wireless-N Gigabit Security Router with VPN How to Access the Web-based Utility There are two ways to connect to your Wireless Router for the first time. 1. Connect your PC to one of the four LAN ports on the Router. (Refer to "Chapter 5: Connecting the Router.") Then, configure your PC to obtain IP address automatically through a DHCP server. 2. Although it is not recommended, you can also connect your PC wirelessly to the Wireless Router.
Wireless-N Gigabit Security Router with VPN • MAC Address Clone. Some ISPs require that you register a MAC address. This feature clones your network adapter's MAC address onto the Router, which prevents you from having to call your ISP to change the registered MAC address to the Router's MAC address. • Advanced Routing. Select the Router’s operation mode either connecting to the Internet or Intranet (NAT is only enabled while connecting to the Internet). Configure dynamic or static routing.
Wireless-N Gigabit Security Router with VPN • Port Range Triggering. Use this screen to set up triggered ranges and forwarded ranges to allow special Internet applications to pass through this NAT Router. • Service. Use this screen to define customized IP applications based on TCP or UDP. The user-defined service type will be available when defining IP based ACL rules. VPN You will use VPN tabs to configure VPN tunnels and accounts to establish a secured channel through Internet. • IPSec VPN.
Wireless-N Gigabit Security Router with VPN • Reboot. If you need to reboot the Router remotely, use this screen. • Firmware Upgrade. Use this screen to upgrade the Router’s firmware. IPS You will use this tab for advanced configuration on built-in Intrusion Prevention System (IPS) inside the Router. • Configure. Enable or disable IPS functions from this screen. • P2P/IM. Allows or blocks specific Peer to Peer (P2P) networks and Instant Messaging (IM) applications. • Report.
Wireless-N Gigabit Security Router with VPN • IPsec. This screen provides status information about the Router’s IPsec VPN tunnels (gateway-to-gateway). Setup Tab The Setup screen contains all of the Router’s basic setup functions. The Router can be used in most network settings without changing any of the default values. Some users may need to enter additional information in order to connect to the Internet through an ISP (Internet Service Provider) or broadband (DSL, cable modem) carrier.
Wireless-N Gigabit Security Router with VPN WAN The WAN Setup screen provides Internet Connection Type and DDNS configurations on the WAN port of the Wireless Router. Before starting, you need to find out the Internet Connection Type and settings used by your ISP. If the Router is used as an Intranet Router, you can mostly use the default settings. If you want to use the dynamic DNS feature, you will need to sign up for a DDNS service. Internet Connection Type The Router supports six connection types.
Wireless-N Gigabit Security Router with VPN PPPoE Most DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password. Enter the User Name and Password provided by your ISP for PPPoE authentication. Connect on Demand: Max Idle Time.
Wireless-N Gigabit Security Router with VPN Connect on Demand: Max Idle Time. You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again.
Wireless-N Gigabit Security Router with VPN L2TP Layer 2 Tunneling Protocol (L2TP) is a service that tunnels Point-to-Point Protocol (PPP) across the Internet. It is used mostly in European countries. Check with your ISP for the necessary setup information. IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here. Subnet Mask. This is the Router’s Subnet Mask.
Wireless-N Gigabit Security Router with VPN Optional Settings (Required by some ISPs) This section is common for all the Internet Connection Types. Some of these settings may be required by your ISP. Verify with your ISP before making any changes. Host Name: Some ISPs, usually cable ISPs, require a host name as identification. You may need to check with your ISP to see if your broadband Internet service is configured with a host name. In most cases you can leave this field blank.
Wireless-N Gigabit Security Router with VPN DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at DynDNS.org or TZO.com. DDNS Service. If your DDNS service is provided by DynDNS.org, then select DynDNS.org from the drop-down menu.
Wireless-N Gigabit Security Router with VPN LAN The LAN Setup section allows you to change the Router’s local network settings for the four Ethernet ports. IPv4 The Router’s Local IPv4 Address and Subnet Mask are shown here. In most cases, you can keep the defaults. Local IP Address. Enter the IPv4 address on the LAN side. The default value is 192.168.1.1. Subnet Mask. Select the subnet mask from the drop-down menu. The default value is 255.255.255.0.
Wireless-N Gigabit Security Router with VPN WINS. The Windows Internet Naming Service (WINS) performs name resolution function (similar to DNS) in the Windows network environment. It can help you to determine the IP address of a remote Windows PC from its computer name. If you have a WINS server, enter that server's IP Address here. Otherwise, leave this blank. IPv6 IPv6 Address. If you selected dual-stack option under IP Versions Setup screen, enter the IPv6 address on the LAN side of the Router.
Wireless-N Gigabit Security Router with VPN DMZ The DMZ screen allows one local PC to be exposed to the Internet for use of a special-purpose service, such as Internet gaming and video-conferencing. DMZ hosting forwards traffic to all the ports for the specified PC simultaneously, unlike Port Range Forwarding that can only forward a maximum of 10 ranges of ports. DMZ Hosting.
Wireless-N Gigabit Security Router with VPN Advanced Routing Operating Mode Select the Operating mode in which the Router will function. Internet Gateway. This is the normal mode of operation. This allows all devices on your LAN to share the same WAN (Internet) IP address. In the Internet Gateway mode, the NAT (Network Address Translation) mechanism is enabled. Intranet Router.
Wireless-N Gigabit Security Router with VPN Static Routing Sometimes you will prefer to use static routes to build your routing table instead of using dynamic routing protocols. Static routes do not require CPU resources to exchange routing information with a peer router. You can also use static routes to reach peer routers that do not support dynamic routing protocols. Static routes can be used together with dynamic routes. Be careful not to introduce routing loops in your network.
Wireless-N Gigabit Security Router with VPN Time You can either define your Router’s time manually or automatically through Time Server. The default is Automatically. Manually If you wish to enter the time and date manually, select the Date from the drop-down fields and enter the hour, minutes, and seconds in the Time field using 24 hour format (example 10:00pm would be entered 22:0:0). Automatically Time Zone.
Wireless-N Gigabit Security Router with VPN Wireless Tab Basic Wireless Settings Change the basic wireless network settings on this screen. Basic Settings Configure the basic Wireless Network attributes for this Wireless Router. SSID Name. The SSID is the unique name shared between all devices in a wireless network. It is case-sensitive, must not exceed 32 alphanumeric characters, and may be any keyboard character. Make sure this setting is the same for all devices in your wireless network.
Wireless-N Gigabit Security Router with VPN when you click the Save Settings button, and it will take several seconds to scan through all the channels to find the best channel. For the Wireless-N 40MHz channel option (see Wireless - Advanced Wireless Settings Tab), the Wireless Router will automatically select the adjacent 20MHz channel to combine them into a wider channel. SSID Broadcast. This option allows the SSID to be broadcast on your network.
Wireless-N Gigabit Security Router with VPN Wireless Security Change the Wireless Router’s wireless security settings on this screen. Wireless Security Security Mode. Select the wireless security mode you want to use, WPA-Personal, WPA2-Personal, WPA2-Personal Mixed, WPA-Enterprise, WPA2-Enterprise, WPA2-Enterprise Mixed, or WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption and forward compatible with IEEE 802.11e.
Wireless-N Gigabit Security Router with VPN WPA2-Personal WPA Algorithms. WPA2 always uses AES for data encryption. WPA Shared Key. Enter a WPA Shared Key of 8-63 characters. Key Renewal Timeout. Enter a Key Renewal Timeout period, which instructs the Wireless Router how often it should change the encryption keys. The default is 3600 seconds. WPA2-Personal Mixed Figure 6-20: Wireless - Wireless Security (WPA2-Personal) This security mode supports the transition from WPA-Personal to WPA2-Personal.
Wireless-N Gigabit Security Router with VPN WPA-Enterprise This option features WPA used in coordination with a RADIUS server for client authentication. (This should only be used when a RADIUS server is connected to the Wireless Router.) RADIUS Server IP Address. Enter the RADIUS server’s IP address. RADIUS Server Port. Enter the port number used by the RADIUS server. The default is 1812. WPA Algorithms. WPA offers you two encryption methods, TKIP and AES for data encryption.
Wireless-N Gigabit Security Router with VPN WPA2-Enterprise Mixed This security mode supports the transition from WPA-Enterprise to WPA2-Enterprise. You can have client devices that use either WPA-Enterprise or WPA2-Enterprise. The Wireless Router will automatically choose the encryption algorithm used by each client device. RADIUS Server IP Address. Enter the RADIUS server’s IP address. RADIUS Server Port. Enter the port number used by the RADIUS server. The default is 1812. WPA Algorithms.
Wireless-N Gigabit Security Router with VPN Wireless Connection Control This screen allows you to configure the Connection Control List to either permit or block specific wireless client devices connecting to (associating with) the Wireless Router. Wireless Connection Control Enabled/Disabled. Enable or disable wireless connection control. The default is Disabled. Connection Control There are two ways to control the connection (association) of wireless client devices.
Wireless-N Gigabit Security Router with VPN Advanced Wireless Settings This screen allows you to configure the advanced settings for the Wireless Router. The Wireless-N Router adopts several new parameters to adjust the channel bandwidth and guard intervals to improve the data rate dynamically. Linksys recommends to let your Wireless Router automatically adjust the parameters for maximum data throughput.
Wireless-N Gigabit Security Router with VPN header). WMM provides the capability to prioritize traffic in your environment. The default in Enabled. Select High Performance (N-Only) if you want to achieve highest throughput on 11n connections. Note that 11b and 11g clients performance will be affected by setting to this mode. IOT Mode. Interoperability Mode. Enabling this mode will help this AP to communicate with Linksys retail client cards (e.g. WPC300N) at 11n rates.
Wireless-N Gigabit Security Router with VPN Firewall Tab The Firewall Tab allows you to configure software security features like SPI (Stateful Packet Inspection) Firewall, IP based Access List, restriction LAN users on Internet (WAN port) access, and NAPT (Network Address Port Translation) Settings (only works when NAT is enabled) to limited services to specific ports.
Wireless-N Gigabit Security Router with VPN Restrict WEB Features Block. Select the Web features that you wish to restrict. All those features could place security concern to your PCs on the LAN side. You have to balance your needs on those applications and security. The default is unselected. • Java: Java is a programming language for websites. If you deny Java, you run the risk of not having access to Internet sites created using this programming language.
Wireless-N Gigabit Security Router with VPN IP Based ACL This screen shows a summary of configured IP based Access List. The Access List is used to restrict traffic going through the Router either from WAN or LAN port. There are two ways to restrict data traffic. You can block specific types of traffic according to your ACL definitions. Or you can allow only specific types of traffic according to your ACL definition. The ACL rules will be read according to its priority.
Wireless-N Gigabit Security Router with VPN Source: This is the source IP address to be matched against. You can define a Single IP address, a Range of IP addresses (start IP and end IP), a Network (IP Prefix and Network Mask), or ANY IP addresses. Destination: This is the destination IP address to be matched against. You can define a Single IP address, a Range of IP addresses (start IP and end IP), a Network (IP Prefix and Network Mask), or ANY IP addresses.
Wireless-N Gigabit Security Router with VPN Log Prefix: This string will be attached in front of the log for the matched event. Source Interface: Select LAN, WAN, or ANY interface. Source: The source IP address to be matched against. You can define a Single IP address, a Range of IP addresses (start IP and end IP), a Network (IP Prefix and Network Mask), or ANY IP addresses. Destination: The destination IP address to be matched against.
Wireless-N Gigabit Security Router with VPN Internet Access Policy Access to the Internet can be managed by policies. A policy consists of four components. You need to define the PCs (MAC or IP address) to apply this policy, either Deny or Allow Internet service, what time and date to enable this policy, and what URLs or Keywords to apply this policy. Use the settings on this screen to establish an access policy. Selecting a policy from the drop-down menu will display that policy's settings.
Wireless-N Gigabit Security Router with VPN 7. If you wish to block access to Web sites, use the Website Blocking by URL Address or Website Blocking by Keyword feature. • Website Blocking by URL Address. Enter the URL or Domain Name of the web sites you wish to block. • Website Blocking by Keyword. Enter the keywords you wish to block in the fields provided. If any of these Keywords appears in the URL of a web site, access to the site will be blocked.
Wireless-N Gigabit Security Router with VPN Single Port Forwarding This is one of the NAPT (Network Address Port Translation) feature. Use the Single Port Forwarding screen when you want to open specific services (that use single port). This allows users on the Internet to access this server by using the WAN port address and the matched external port number.
Wireless-N Gigabit Security Router with VPN Port Range Forwarding This is one of the NAPT (Network Address Port Translation) features. The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications that use one or multiple port numbers (e.g. video conference). The port numbers being used will not change while forwarding to the local network.
Wireless-N Gigabit Security Router with VPN Port Range Triggering This is one of the NAPT (Network Address Port Translation) feature. Port Range Triggering is used for special applications that can request a port to be opened on demand. For this feature, the Wireless Router will watch outgoing packets for specific port numbers. This will trigger the Wireless Router to allow the incoming packets within the specified forwarding range and forward those packets to the triggering PC.
Wireless-N Gigabit Security Router with VPN Service This screen allows users to define new service types based on TCP or UDP. The new service will be added to the summary table below. It will also show up in the service drop-down menu under Edit IP ACL Rule screen. Name: Define the new service name. The service name must be different from existing pre-defined or user-defined services. Type: The service can rely on UDP only, TCP only, or both UDP and TCP. Start Port: Enter the starting port number.
Wireless-N Gigabit Security Router with VPN VPN Tab IPsec VPN Use this screen to create VPN tunnels between the Router to the remote Router. All Linksys Routers with IPsec VPN support can be used as a remote Router (e.g. RVS4000, WRV54G, RV042). The Router supports VPN tunnels using IPsec (IP Security) technologies. You can create, delete, or modify a VPN tunnel on this page. Select Tunnel Entry. Select a tunnel to configure or create a new tunnel. Delete Button.
Wireless-N Gigabit Security Router with VPN Remote Security Gateway. Select the remote gateway WAN port IP Address that can use this VPN tunnel. This may be a Single IP address or Any addresses. If is set, the Router acts as responder and accepts request from any remote Gateway. IP Address. Enter the IP address on the remote WAN port. Key Management Key Exchange Method. The Router supports both automatic and manual key management.
Wireless-N Gigabit Security Router with VPN Manual Encryption Algorithm. The Encryption method determines the complexity to encrypt/decrypt data packets. Only 3DES is supported. Notice that both sides must use the same Encryption method. Encryption Key. This field specifies a key used to encrypt and decrypt data packets. Both characters and hexadecimal values are acceptable in this field. Note: that both sides must use the same Encryption Key. Authentication Algorithm.
Wireless-N Gigabit Security Router with VPN Advanced Settings button. If the Key Exchange Method is Auto (IKE), this button provides access to some additional settings relating to IKE. Use this if the Router is unable to establish a VPN tunnel to the remote VPN Gateway; ensure the Advanced Settings match those on the remote VPN Gateway. Note that Phase 1 is used for key negotiation and Phase 2 is used for actual data exchange. Advanced Settings (Phase 1 and Phase 2) Operation Mode.
Wireless-N Gigabit Security Router with VPN degrades performance. While this unit is in seconds, it is common to use periods over an hour (3600 seconds) for the SA Life Time. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Help information is displayed on the right-hand side of the screen, and click More for additional details.
Wireless-N Gigabit Security Router with VPN VPN Client Accounts You can allow remote users to easily establish a VPN connection to your Router using the Linksys QuickVPN client utility without using a compatible VPN Router with IPsec VPN settings. This is achieved by creating user accounts on the Router and authenticate users through Username and Password. After creating user accounts, it will be summarized in the table below.
Wireless-N Gigabit Security Router with VPN VPN Passthrough This screen allows users to use their own VPN algorithms to connect to their remote Routers. The Wireless Router will just pass the traffic through. IPsec Passthrough. Internet Protocol Security (IPsec) is a suite of protocols used to implement secure exchange of packets at the IP layer. IPsec Passthrough is enabled by default to allow IPsec tunnels to pass through the Router. To disable IPsec Passthrough, select Disabled. PPTP Passthrough.
Wireless-N Gigabit Security Router with VPN QoS Tab QoS (Quality of Service) allows you to prioritize network traffic using either Application-based priority (such as Web browsing applications, FTP applications, etc.) or Port-based priority, which allows you to assign priorities to the four physical network ports. Higher priority traffic will be allocated more bandwidth, which results in lower latency (or delay).
Wireless-N Gigabit Security Router with VPN Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Help information is displayed on the right-hand side of the screen, and click More for additional details. Port-based Port-based QoS is implemented in hardware so it can achieve better throughput. It can only control traffic among the four LAN ports. LAN ports 1-4 can be assigned High, Medium, Normal, or Low priority.
Wireless-N Gigabit Security Router with VPN Administration Tab Management Local Gateway Access This configures the administrator user accounts to manage the Wireless Router through Web based Utility. Only the first user is created by default. Other accounts are not created by default so you can leave them alone. Make sure to change the first user account username and password when you configure your Wireless Router for the first time. Gateway Userlist. Select a user to configure from the drop-down menu.
Wireless-N Gigabit Security Router with VPN Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Help information is displayed on the right-hand side of the screen, and click More for additional details. Log This screen provides you options on how you want to manage your system logs. The Wireless Router provides four categories of event logging (Firewall, VPN, System, and ACL).
Wireless-N Gigabit Security Router with VPN Diagnostics Ping Test Parameters Ping Target IP. Enter the IP address or URL that you want to ping. Ping Size. Enter the size of the packet you want to use. Number of Pings. Enter the number of times you wish to ping the target device. Ping Interval. Enter the time period (in milliseconds) between each ping. Ping Timeout. Enter the desired time period (in milliseconds).
Wireless-N Gigabit Security Router with VPN Config Management Save Configuration Save Configuration to File button. Click this button to save your Wireless Router’s current configuration to a file on your PC. Enter the file name on the Windows screen that appears. Restore Configuration Select a previously saved configuration file to restore the configuration to the Wireless Router. This could be helpful if you want to use the same configuration on a new hardware or after resetting to the factory defaults.
Wireless-N Gigabit Security Router with VPN Factory Defaults Restore Factory Defaults. Click this button to reset all configuration settings to their default values. All settings that have been saved will be lost when the default settings are restored. After clicking the button, another screen will appear. Click OK to continue. Another screen will appear while the system reboots. Figure 6-56: Administration - Factory Default Reboot Reboot. Click this button to reboot the whole system remotely.
Wireless-N Gigabit Security Router with VPN IPS Tab The Wireless Router supports advanced Intrusion Prevention Systems (IPS), which is an integral part of the self-defending strategy. It allows you to stay current on the latest threats so that malicious or damaging traffic is accurately identified, classified, and stopped in realtime. You can use IPS together with Firewall, IP based ACL, and IPsec VPN to achieve maximum securities. The IPS is hardware-accelerated on this Wireless Router.