CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the
Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting
To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,
Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare,
GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound,
MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and
certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between
Cisco and any other company. (0812R)
How to Purchase, Register, or Activate the Service179
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guidevi
ProtectLink179
Contents
How to Use the Service181
ProtectLink > Web Protection182
ProtectLink > Email Protection186
ProtectLink > License186
Appendix F: Specifications188
Specifications188
Performance188
Setup/Config188
Management189
Security Features189
QoS189
Network190
VPN190
Routing190
Layer 2190
Environmental191
Appendix G: Where to Go From Here192
Product Resources192
Related Documentation193
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guidevii
About This Document
!
The focus of this guide is on the hardware and software features found on the
Cisco Small Business RVS4000 4-Port Gigabit Security Router with VPN.
Advanced configuration settings and security options are covered in this
administration guide.
How to Use This Guide
This administration guide has been designed to make understanding the router
easier. Look for the following items when reading this guide:
Preface
CAUTION This exclamation point indicates that caution should be used when performing a
NOTE This checkmark indicates there is a note of interest and is something you should
Organization
step or a serious error may occur.
pay special attention to while using the router.
This table describes the contents of each chapter in this document.
ChapterTitleDescription
Chapter 1IntroductionIntroduces the product and this user
manual.
Chapter 2Networking and
Security Basics
Introduces basic networking and
security concepts.
Chapter 3Planning Your Virtual
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide1
Private Network (VPN)
Describes how to connect the
product.
ChapterTitleDescription
Preface
Chapter 4Getting Started with the
RVS4000 Router
Chapter 5Setting Up and
Configuring the Router
Chapter 6Using the VPN Setup
Wizard
Appendix ATroubleshootingProvides solutions to problems that
Appendix BUsing Cisco QuickVPN
for Windows 2000, XP, or
Vista
Appendix CConfiguring IPSec with a
Windows 2000 or XP
Computer
Describes the physical features of
the RVS4000 router and provides
information for installing the router.
Describes how to set up the product
software.
Describes how to configure a
gateway-to-gateway VPN tunnel
between two VPN routers.
may occur during the installation and
operation of the router.
Explains how to install and use the
Cisco QuickVPN software
Explains how to establish a secure
IPSec tunnel using preshared keys to
join a private network inside the
router and a Windows 2000 or XP
computer.
Explains how to configure an IPSec
VPN tunnel between two VPN
routers by example.
Explains how to use the Trend Micro
ProtectLink Gateway service
Finding Information in PDF Files
The Cisco RVS4000 router documents are published as PDF files. The PDF Find/
Search tool within Adobe® Reader® lets you find information quickly and easily
online. You can perform the following tasks:
•Search an individual PDF file.
•Search multiple PDF files at once (for example, all PDFs in a specific folder
or disk drive).
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide2
Preface
•Perform advanced searches.
Finding Text in a PDF
Follow this procedure to find text in a PDF file.
STEP 1Enter your search terms in the Find text box on the toolbar.
NOTE By default, the Find tool is available at the right end of the Acrobat toolbar. If the
Find tool does not appear, choose Edit > Find.
STEP 2Optionally, click the arrow next to the Find text box to refine your search by
choosing special options such as Whole Words Only.
STEP 3Press Enter.
STEP 4Acrobat displays the first instance of the search term.
STEP 5Press Enter again to continue to more instances of the term.
Finding Text in Multiple PDF Files
The
Search
on your computer or local network. The PDF files do not need to be open.
STEP 1Start Acrobat Professional or Adobe Reader.
STEP 2Choose Edit > Search, or click the arrow next to the
Open Full Acrobat Search.
window lets you search for terms in multiple PDF files that are stored
Find
box and then choose
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide3
Preface
STEP 3In the
a. Enter the text that you want to find.
b. Choose All PDF Documents in.
From the drop-down box, choose Browse for Location. Then choose the
location on your computer or local network, and click OK.
c. If you want to specify additional search criteria, click Use Advanced Search
Options, and choose the options you want.
d. Click Search.
Search
window, complete the following steps:
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide4
Preface
STEP 4When the Results appear, click + to open a folder, and then click any link to open
the file where the search terms appear.
For more information about the Find and Search functions, see the Adobe Acrobat
online help.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide5
Introduction
Thank you for choosing the Cisco RVS4000 4-Port Gigabit Security Router with
VPN. The 4-Port Gigabit Security Router with VPN is an advanced Internet-sharing
network solution for your small business needs. Like any router, it lets multiple
computers in your office share an Internet connection.
The 4-Port Gigabit Security Router with VPN also features a built-in 4-Port fullduplex 10/100/1000 Ethernet switch to connect four PCs directly, or you can
connect more hubs and switches to create as big a network as you need.
The Virtual Private Network (VPN) capability creates encrypted “tunnels” through
the Internet, allowing up to 5 remote offices and 5 traveling users to securely
connect into your office network from off-site. Users connecting through a VPN
tunnel are attached to your company’s network — with secure access to files, email, and your intranet — just as if they were in the building. You can also use the
VPN capability to allow users on your small office network to securely connect out
to a corporate network. The QoS features provide consistent voice and video
quality throughout your business.
1
The 4-Port Gigabit Security Router with VPN can serve as a DHCP Server, and has
a powerful SPI firewall and Intrusion Prevention System (IPS) to protect your PCs
against intruders and most known Internet attacks. It can be configured to filter
internal users’ access to the Internet, and has IP and MAC address filtering so you
can specify exactly who has access to your network. Configuration is a snap with
the web browser-based configuration utility.
This administration guide will give you all the information you need to connect, set
up, and configure your router.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide6
Networking and Security Basics
This chapter describes networking and security basics. It includes the following
sections:
•An Introduction to LANs, page 7
•The Use of IP Addresses, page 7
•The Intrusion Prevention System (IPS), page 9
An Introduction to LANs
2
A router is a network device that connects two networks together.
The router connects your local area network (LAN), or the group of PCs in your
home or office, to the Internet. The router processes and regulates the data that
travels between these two networks.
The router’s Network Address Translation (NAT) technology protects your network
of PCs so users on the Internet cannot “see” your PCs. This is how your LAN
remains private. The router protects your network by inspecting the first packet
coming in through the Internet port before delivery to the final destination on one
of the Ethernet ports. The router inspects Internet port services like the web
server, ftp server, or other Internet applications, and, if allowed, it will forward the
packet to the appropriate PC on the LAN side.
The Use of IP Addresses
IP stands for Internet Protocol. Every device in an IP-based network, including PCs,
print servers, and routers, requires an IP address to identify its location, or
address, on the network. This applies to both the Internet and LAN connections.
There are two ways of assigning IP addresses to your network devices.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide7
Networking and Security Basics
The Use of IP Addresses
A static IP address is a fixed IP address that you assign manually to a PC or other
device on the network. Since a static IP address remains valid until you disable it,
static IP addressing ensures that the device assigned it will always have that same
IP address until you change it. Static IP addresses are commonly used with
network devices such as server PCs or print servers.
If you use the router to share your cable or DSL Internet connection, contact your
ISP to find out if they have assigned a static IP address to your account. If so, you
will need that static IP address when configuring the router. You can get the
information from your ISP.
A dynamic IP address is automatically assigned to a device on the network. These
IP addresses are called dynamic because they are only temporarily assigned to
the PC or other device. After a certain time period, they expire and may change. If
a PC logs onto the network (or the Internet) and its dynamic IP address has
expired, the DHCP server will assign it a new dynamic IP address.
2
A DHCP server can either be a designated PC on the network or another network
device, such as the router. By default, the router’s Internet Connection Type is
Obtain an IP automatically (DHCP).
The PC or network device obtaining an IP address is called the DHCP client. DHCP
frees you from having to assign IP addresses manually every time a new user is
added to your network.
For DSL users, many ISPs may require you to log on with a user name and
password to gain access to the Internet. This is a dedicated, high-speed
connection type called Point to Point Protocol over Ethernet (PPPoE). PPPoE is
similar to a dial-up connection, but PPPoE does not dial a phone number when
establishing a connection. It also will provide the router with a dynamic IP address
to establish a connection to the Internet.
By default, a DHCP server (on the LAN side) is enabled on the router. If you already
have a DHCP server running on your network, you MUST disable one of the two
DHCP servers. If you run more than one DHCP server on your network, you will
experience network errors, such as conflicting IP addresses. To disable DHCP on
the router, see the Basic Setup section in Chapter 5, “Setting Up and Configuring
the Router.”
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide8
Networking and Security Basics
The Intrusion Prevention System (IPS)
NOTE Since the router is a device that connects two networks, it needs two IP
addresses—one for the LAN, and one for the Internet. In this Administration
Guide, you’ll see references to the “Internet IP address” and the “LAN IP
address”.
Since the router uses NAT technology, the only IP address that can be seen
from the Internet for your network is the router’s Internet IP address.
However, even this Internet IP address can be blocked so the router and
network seem invisible to the Internet.
The Intrusion Prevention System (IPS)
2
IPS is an advanced technology to protect your network from malicious attacks. IPS
works together with your SPI Firewall, IP Based Access Control List (ACL),
Network Address Port Translation (NAPT), and Virtual Private Network (VPN) to
achieve the highest level of security. IPS works by providing real-time detection
and prevention as an in-line module in a router.
The RVS4000 has hardware-based acceleration for real-time pattern matching for
detecting malicious attacks. It actively filters and drops malicious TCP/UDP/ICMP/
IGMP packets and can reset TCP connections. This protects your client PCs and
servers running various operating systems including Windows, Linux, and Solaris
from network worm attacks. However, this system does not prevent viruses
contained in e-mail attachments.
The P2P (Peer-to-Peer) and IM (Instant Messaging) control allows the system
administrator to prevent network users from using those protocols to
communicate with people over the Internet. This helps the administrators to set up
company policies on how to use the Internet bandwidth wisely.
The signature file is the heart of the IPS system. It is similar to the Virus definition
file on your PC’s Anti-Virus software. IPS uses this file to match against packets
coming into the router and performs actions accordingly. The RVS4000 is shipped
with a signature file containing 1000+ rules, which cover the following categories:
DDoS, Buffer Overflow, Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus,
Worm, and Web Attacks.
Customers are encouraged to update their IPS signature file regularly to prevent
any new types of attacks on the Internet.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide9
Networking and Security Basics
The Intrusion Prevention System (IPS)
IPS Scenarios
2
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide10
3
Planning Your Virtual Private Network (VPN)
This chapter provides information for planning your VPN and includes the
following sections:
•Why do I need a VPN?, page 11
•What is a VPN?, page12
Why do I need a VPN?
Computer networking provides a flexibility not available when using an archaic,
paper-based system. With this flexibility, however, comes an increased risk in
security. This is why firewalls were first introduced. Firewalls help to protect data
inside of a local network. But what do you do once information is sent outside of
your local network, when e-mails are sent to their destination, or when you have to
connect to your company’s network when you are out on the road? How is your
data protected?
That is when a VPN can help. VPNs are called Virtual Private Networks because
they secure data moving outside of your network as if it were still within that
network.
When data is sent out across the Internet from your computer, it is always open to
attacks. You may already have a firewall, which will help protect data moving
around or held within your network from being corrupted or intercepted by entities
outside of your network, but once data moves outside of your network—when you
send data to someone via e-mail or communicate with an individual over the
Internet—the firewall will no longer protect that data.
At this point, your data becomes open to hackers using a variety of methods to
steal not only the data you are transmitting but also your network login and
security data. Some of the most common methods are as follows:
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide11
Planning Your Virtual Private Network (VPN)
What is a VPN?
1) MAC Address Spoofing
Packets transmitted over a network, either your local network or the Internet, are
preceded by a packet header. These packet headers contain both the source and
destination information for that packet to transmit efficiently. A hacker can use this
information to spoof (or fake) a MAC address allowed on the network. With this
spoofed MAC address, the hacker can also intercept information meant for
another user.
2) Data Sniffing
Data “sniffing” is a method used by hackers to obtain network data as it travels
through unsecured networks, such as the Internet. Tools for just this kind of activity,
such as protocol analyzers and network diagnostic tools, are often built into
operating systems and allow the data to be viewed in clear text.
3
What is a VPN?
3) Man in the middle attacks
Once the hacker has either sniffed or spoofed enough information, he can now
perform a “man in the middle” attack. This attack is performed, when data is being
transmitted from one network to another, by rerouting the data to a new
destination. Even though the data is not received by its intended recipient, it
appears that way to the person sending the data.
These are only a few of the methods hackers use and they are always developing
more. Without the security of your VPN, your data is constantly open to such
attacks as it travels over the Internet. Data travelling over the Internet will often
pass through many different servers around the world before reaching its final
destination. That’s a long way to go for unsecured data and this is when a VPN
serves its purpose.
A VPN, or Virtual Private Network, is a connection between two endpoints—a VPN
router, for instance—in different networks that allows private data to be sent
securely over a shared or public network, such as the Internet. This establishes a
private network that can send data securely between these two locations or
networks.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide12
Planning Your Virtual Private Network (VPN)
What is a VPN?
This is done by creating a “tunnel”. A VPN tunnel connects the two PCs or
networks and allows data to be transmitted over the Internet as if it were still
within those networks. Not a literal tunnel, it is a connection secured by encrypting
the data sent between the two networks.
VPN was created as a cost-effective alternative to using a private, dedicated,
leased line for a private network. Using industry standard encryption and
authentication techniques—IPSec, short for IP Security—VPN creates a secure
connection that, in effect, operates as if you were directly connected to your local
network. VPN can be used to create secure networks linking a central office with
branch offices, telecommuters, and/or professionals on the road (travelers can
connect to a VPN router using any computer with the Cisco QuickVPN Client
software.)
There are two basic ways to create a VPN connection:
•VPN router to VPN router
3
•Computer (using the Cisco QuickVPN Client software) to VPN router
The VPN router creates a “tunnel” or channel between two endpoints, so that data
transmissions between them are secure. A computer with the Cisco QuickVPN
Client software can be one of the two endpoints (refer to Appendix B, “Using
Cisco QuickVPN for Windows 2000, XP, or Vista”). If you choose not to run the VPN
client software, any computer with the built-in IPSec Security Manager (Microsoft
2000 and XP) allows the VPN router to create a VPN tunnel using IPSec (refer to
Appendix C, “Configuring IPSec with a Windows 2000 or XP Computer”). Other
versions of Microsoft operating systems require additional, third-party VPN client
software applications that support IPSec to be installed.
VPN Router to VPN Router
An example of a VPN router-to-VPN router VPN would be as follows. At home, a
telecommuter uses his VPN router for his always-on Internet connection. His router
is configured with his office’s VPN settings. When he connects to his office’s router,
the two routers create a VPN tunnel, encrypting and decrypting data. As VPNs
utilize the Internet, distance is not a factor. Using the VPN, the telecommuter now
has a secure connection to the central office’s network, as if he were physically
connected. For more information, refer to Appendix D, “Gateway-to-Gateway VPN
Tunnel.”
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide13
Planning Your Virtual Private Network (VPN)
What is a VPN?
VPN Router to VPN Router
Computer (using the Cisco QuickVPN Client software) to VPN
Router
3
The following is an example of a computer-to-VPN router VPN. In her hotel room, a
traveling businesswoman connects to her ISP. Her notebook computer has the
Cisco QuickVPN Client software, which is configured with her office’s IP address.
She accesses the Cisco QuickVPN Client software and connects to the VPN
router at the central office. As VPNs utilize the Internet, distance is not a factor.
Using the VPN, she now has a secure connection to the central office’s network, as
if she were physically connected.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide14
Planning Your Virtual Private Network (VPN)
What is a VPN?
Computer to VPN Router
3
For additional information and instructions about creating your own VPN, please
visit www.cisco.com. You can also refer to Appendix B, “Using Cisco QuickVPN for
Windows 2000, XP, or Vista”, Appendix C, “Configuring IPSec with a Windows
2000 or XP Computer” and Appendix D, “Gateway-to-Gateway VPN Tunnel.”
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide15
Getting Started with the RVS4000 Router
This chapter describes the physical features of the RVS4000 router and provides
information for installing the router. The following sections are included:
•Front Panel, page16
•Back Panel, page17
•Placement Options, page18
•Installing the Router, page 20
•Configuring the Router, page 21
4
Front Panel
The LEDs are located on the front panel of the router.
Front Panel
POWER LED—Lights up green to indicate the router is powered on. The LED
flashes when the router is running a diagnostic test.
DIAG LED—If this light is off, the system is ready. The Diag LED blinks red
during firmware upgrades.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide16
Getting Started with the RVS4000 Router
Back Panel
IPS LED—The IPS LED lights up when the Intrusion Prevention System (IPS)
function is enabled. If the LED is off, then IPS functions are disabled. The IPS
LED flashes green when an external attack is detected. It flashes red when an
internal attack is detected.
Ethernet Port LEDs 1-4—For each LAN port, there are three LEDs. If a port
LED is continuously lit green, the router is connected to a device at the speed
indicated through the corresponding port (1, 2, 3, or 4). The LED flashes green
when a router is actively sending or receiving data on that port.
INTERNET LED—The Internet LED lights up green to indicate the line speed of
the device attached to the Internet port. If the router is connected to a cable or
DSL modem, typically the 100 LED will be the only LED lit up, indicating
100 Mbps. Flashing indicates activity.
Back Panel
4
The Ethernet ports, Internet port, Reset button, and Power port are on the back panel of
the router.
Back Panel
RESET Button—The Reset button can be used in two ways:
•If the router is having problems connecting to the Internet, press
the Reset button for just a second with a paper clip or a pencil tip.
This is similar to pressing the reset button on your PC to reboot it.
•If you are experiencing extreme problems with the router and
have tried all other troubleshooting measures, press and hold in
the Reset button for 10 seconds. This will restore the factory
defaults and clear all of the router settings, such as port
forwarding or a new password.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide17
INTERNET Port—Provides a WAN connection to a cable modem or DSL
modem.
Getting Started with the RVS4000 Router
274946
POWER DIAG IPSETHERNET
RVS4000
10
100
1000
1 2 3 4
INTERNET
Placement Options
ETHERNET Ports 1-4—Provide a LAN connection to network devices,
such as PCs, print servers, or additional switches.
POWER Port—Connects the router to power via the supplied AC power
adapter.
Placement Options
You can place the router horizontally on the rubber feet, mount it in the stand, or
mount it on the wall.
Desktop Option
4
For desktop placement, place the Cisco RVS4000 router horizontally on a surface
so it sits on its four rubber feet.
Stand Option
To install the router vertically in the supplied stands, follow the steps below.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide18
Getting Started with the RVS4000 Router
193817
Wall
mount
slots
2-9/16
Placement Options
To place the router vertically, follow these steps.
STEP 1Locate the left side panel of the router.
STEP 2With the two large prongs of one of the stands facing outward, insert the short
prongs into the little slots in the router and push the stand upward until the stand
snaps into place.
4
STEP 3Repeat step 2 with the other stand.
Wall Option
To mount the Cisco RVS4000 router on the wall, follow these steps.
STEP 1Determine where you want to mount the router and install two screws (not
supplied) that are 2-9/16 in. apart (approximately 64.5 mm).
STEP 2With the back panel pointing up (if installing vertically), line up the router so that the
wall-mount crisscross slots on the bottom of the access point line up with the two
screws.
STEP 3Place the wall-mount slots over the screws and slide the router down until the
screws fit snugly into the wall-mount slots.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide19
Getting Started with the RVS4000 Router
Installing the Router
Installing the Router
To prepare the router for installation do the following:
•Obtain the setup information for your specific type of Internet connection
from your Internet Service Provider (ISP).
•Power off all of your network hardware, including the router, PCs, and cable
modem or DSL modem.
Perform the steps in this section to install the hardware.
STEP 1Connect one end of an Ethernet network cable to one of the LAN ports
(labeled 1-4) on the back of the router. Connect the other end to an Ethernet port
on a PC.
4
STEP 2Repeat step 1 to connect up to four PCs, switches, or other network devices to the
router.
STEP 3Connect an Ethernet network cable from your cable modem or DSL modem to the
Internet port on the back panel of the router.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide20
Getting Started with the RVS4000 Router
Configuring the Router
STEP 4Power on the cable or DSL modem.
STEP 5Connect the power adapter to the router’s Power port and plug the other end into
an electrical outlet.
4
STEP 6The Power and Internet LEDs on the front panel will light up green as soon as the
power adapter is connected.
STEP 7Power on the PCs.
The router hardware installation is now complete.
Configuring the Router
To configure the RVS4000, plug a PC into the router and launch the web-based
configuration utility.
NOTE Before setting up the router, make sure your PCs are configured to obtain an IP (or
TCP/IP) address automatically from the router.
STEP 1Launch a web browser, such as Internet Explorer or Mozilla Firefox.
STEP 2In the Address field enter http://192.168.1.1 and press Enter.
STEP 3In the User Name and Password fields, enter admin.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide21
Getting Started with the RVS4000 Router
Configuring the Router
The default user name and password is admin.
STEP 4Click OK.
For added security, you should later set a new password using the
Administration > Management window of the web-based utility.
STEP 5The web-based utility will appear with the Setup menu and Summary selected.
Click WAN under the Setup menu.
STEP 6If requested by your ISP (usually cable ISPs), complete the Host Name and Domain
Name fields, and the MTU and MTU Size fields. Otherwise, leave the defaults.
STEP 7In the WAN screen, choose an Internet Connection Type from the
drop-down menu. Depending on which Internet connection type you select,
addtional setup may be required.
The Internet Connection Types are:
4
Automatic Configuration - DHCP: If you are connecting through DHCP or a
dynamic IP address from your ISP, keep this default setting.
Static IP: If your ISP assigns you a static IP address, select Static IP from the
drop-down menu. Complete the Internet IP Address, Subnet Mask, Default
Gateway, and DNS fields. Enter at least one DNS address.
PPPoE: If you are connecting through PPPoE, select PPPoE from the drop-down
menu. Complete the User Name and Password fields.
PPTP: PPTP is a service used in Europe only. If you are using a PPTP
connection, check with your ISP for the necessary setup information.
Heartbeat Signal: Heartbeat Signal is used primarily in Australia. Check with
your ISP for the necessary setup information.
L2TP: L2TP is used mostly in Europe. Check with your ISP for the necessary
setup information.
STEP 8When you are finished entering your Internet connection settings, click Save.
STEP 9Restart or power on your PC to obtain the new router setting.
STEP 10 Test the setup by opening your web browser from any computer and entering
http://www.cisco.com/smb.
Congratulations! The installation of the router is complete.
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide22
Getting Started with the RVS4000 Router
Configuring the Router
NOTE For more information about advanced settings and security options, refer to
Chapter 5, “Setting Up and Configuring the Router.”
4
Cisco RVS4000 4-Port Gigabit Security Router with VPN Administration Guide23
Loading...
+ 170 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.