Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does
not imply a partnership relationship between Cisco and any other company. (1110R)
Contents
Chapter 1: Getting Started5
Connecting to Your Wireless Network7
Chapter 2: Viewing Device Status8
Viewing the Dashboard8
Viewing the System Summary9
Viewing Active TCP/IP Services11
Viewing Wireless Statistics11
Viewing Captive Portal Status11
Viewing Site-to-Site IPsec VPN Connection Status11
Viewing the IPsec VPN Server Status12
Viewing PPTP Server12
Viewing Logs12
Viewing Connected Devices13
Viewing Port Statistics14
Viewing the Mobile Network Status14
Chapter 3: Configuring Networking16
Configuring Wired WAN Connections16
Configuring a Mobile Network25
Configuring Global Mobile Network Settings25
Configuring Mobile Network Settings Manually26
Bandwidth Cap Setting27
E-mail Setting
Setting Failover and Recovery28
Configuring LAN Settings29
Changing the Device Management IP Address29
Configuring DHCP Server30
Configuring Bonjour128
Configuring Date and Time Settings128
Backing Up and Restoring the System129
Upgrading Firmware or Changing the Language132
Restarting the Device134
Restoring the Factory Defaults134
The Getting Started page displays the most common configuration tasks on your
device. Click the links on the Web page to go to the relevant configuration page.
This page appears every time you start Devic e Manager. To change this behavior,
check Don’t show on start up.
Initial Settings
1
Change Default
Administrator Password
Launch Setup WizardLaunches the Setup Wizard. Follow the on-screen
Configure WAN SettingsOpens the Internet Setup page to change
Configure LAN SettingsOpens the LAN Configuration page to modify LAN
Configure Wireless
Settings
Displays the Users page where you can change
the administrator password and set up a guest
account. See Configuring User Accounts.
instructions.
parameters. For example, the device host name.
See Configuring Wired WAN Connections.
parameters. For example, the management IP
address. See Configuring LA N Settings.
Open the Basic Settings page to manage the
radio. See Configuring Wireless Networks.
To connect a client device (such as a computer) to your wireless network,
configure the wireless connection on the client device with the wireless security
information that you configured for the router by using the Setup Wizard.
The following steps are provided as an example; you may need to configure your
device differently. For specific instructions, consult the documentation for your
client device.
STEP 1 Open the wireless connection settings window or program for your device.
Your computer might have special software installed to manage wireless
connections, or you might find the wireless connections under the Control Panel in
the Network Connections or Network and Internet window. (The location
depends on your operating system.)
1
STEP 2 Enter the network name (SSID) that you chose for your network in the Setup
Wizard.
STEP 3 Choose the type of encryption and enter the security key that you specified in the
Setup Wizard.
If you did not enable security (not recommended), leave the wireless encryption
fields that were configured with the security type and passphrase blank.
STEP 4 Verify your wireless connection and save your settings.
To ensure that data and statistics are frequently updated on Status pages, choose
a refresh rate from the Refresh Rate drop-down list.
Viewing the Dashboard
2
Choose Status > Dashboard to view a snapshot of the configuration of your
device. The Dashboard page displays information about your device’s firmware
version, CPU and memory utilization, error-logging settings, LAN, WAN, wireless,
site-to-site IPsec VPN, and PP TP VPN server settings.
To modify the information display ed, click the details link to go t o the configuration
page for the section. For more information about managing the settings displayed
on the Dashboard page, see:
•Configuring Log Settings
•Configuring Basic Site-to-Site IPsec VPN
•Configuring LAN Settings
•Configuring Wired WAN Connections
•Configuring Basic Wireless Settings
From the Refresh Rate drop-down list, choose the rate at which the latest
statistics and parameter values are refreshed on the dashboard.
The Dashboard page also displays an interactive view of your device’s back panel
when you click Show Panel View. Mouse-over each port to view port connection
information.
Choose Status > System Summary to view details of your device properties,
network settings across IP address modes, firewall, wireless and VPN settings.
Click Refresh to see the latest information.
Click the underlined link to go to the related configuration window. For example, to
modify the LAN IP address, click LAN IP. The LAN Configuration window is
displayed.
The System Summary page displays information in the following sections:
System Information
•Firmware Version—Current software version that the device is running.
•Firmware MD5 Checksum—The message-digest algorithm used to verify
the integrity of files.
2
•Locale—The language installed on the router.
•Language Version—The version of the installed language pack. The
language pack version should be compatible with the currently installed
firmware. In some cases, an older language pack may be used with a newer
firmware image. The router checks the language pack version to see if it is
compatible with the current firmware version.
•Language MD5 Checksum—The MD5 checksum of the language pack.
•CPU Model—Chipset of CPU currently used.
•Serial Number—Serial number of the device.
•System Up Time—Length of time that the system has been running.
•Current Time—Time of day.
•PID VID—Product ID and version ID of the device.
IPv4 Configuration
•LAN IP—LAN IP address of the device.
•WAN IP—WAN IP address of the device. To release the current IP address
and obtain a new one, click Release or Renew.
•Gateway—IP addr ess of the gateway to which the device is connected (for
For more information on configuring VPN server connections and user accounts,
see Configuring Basic Site-to-Site IPsec VPN and Configuring PPTP.
Viewing Active TCP/IP Services
Choose Status > Active TCP/IP Services to view IPv4 and IPv6 TCP/IP
connections that are active on your device. The Active Service List section for IPv4
and IPv6 displays the protocols and the services that are active on the device.
Viewing Wireless Statistics
Choose Status > Wireless Statistics to view wireless statistical data for the
device radio. In the Refresh Rate field, choose the rate at which you want the latest
statistics to be displayed.
2
To show the bytes in kilobytes (KB) and the numerical data in rounded-up values,
check the Show Simplified S tatistic Data check box and click Save. By default,
byte data is displayed in bytes and other numerical data is displayed in long form.
To reset the wireless statistics counters, click Clear Count. The counters are reset
when the device is rebooted.
Viewing Captive Portal Status
Choose Status > Captive Portal to view information about the connected Captive
Portal users. For more information about configuring Captive Portals on your
device, see Configuring Captive Portal.
Viewing Site-to-Site IPsec VPN Connection Status
Choose Status > Site-to-Site IPsec VPN to view the connection status of active
site-to-site IPsec VPN policies on the device. For information on configuring VPN
policies, see Configuring Basic Site-to-Site IPsec VPN.
To change the rate at which latest and real-time connection status is displayed,
choose a refresh rate from the Refresh Rate drop-down list.
By default, byte data is displayed in bytes and other numerical data is displayed in
long form. To show the bytes in kilobytes (KB) and the numerical data in roundedup form, check the Show Simplified Statistic Data box and click Save.
To terminate an active VPN connection, click Disconnect.
Viewing the IPsec VPN Server Status
Choose Status > IPsec VPN Server to view a list of your IPsec VPN connections
and the duration of the connection. For more information about configuring IPsec
VPN connections, see Configuring IPsec VPN Server.
2
Viewing PPTP Server
Choose Status > PPTP Server to view a list of your PPTP VPN connections, the
duration of the connection, and the actions you can perfom on this connection. For
more information about configuring PPTP VPN connections, see Configuring
PPTP.
Viewing Logs
Choose Status > View Logs. Click Refresh Logs, to display latest log entries.
To filter logs or specify the severity of logs to display, check the boxes next to the
log type and click Go. Note that all log types above a selected log type are
automatically included and you cannot deselect them. For example, checking the
Error check box automatically includes emergency, alert, and critical logs in
addition to error logs.
The event severity levels are list ed from the highest severity to the lowest severity ,
as follows:
•Emergency—Messages about events such as a system crash.
•Alert—Messages about conditions that require immediate correcti ve action.
•Critical—Messages for when the system is in a critical condition.
•Error—Messages about conditions that are not critical but require corrective
action.
•Warning—System warnings.
•Notification—Messages about normal but significant conditions that may
require attention.
•Inf ormational—Messages about device information.
•Debugging—Detailed information about an event.
To delete all entries in the log window, click Clear Logs.
To save all log messages from the device to the local hard drive, click Save Logs.
To specify the number of entries to show per page, choose a number from the
drop-down menu.
To move between log pages, use the page navigation buttons .
Viewing Connected Devices
The Connected Devices page displays information about the active client
devices connected to your router. To view connected devices, choose Status >
Connected Devices.
To specify the types of interfaces to display, select a value from the Filter dropdown menu:
•All—All devices connected to the router.
•Wireless—All devices connected through the wireless interface.
•Wired—All devices connected through the Ethernet ports on the router.
•WDS—All Wireless Distribution System (WDS) devices connected to the
router .
IPv4 ARP Table displays information from other routers that have responded to
the device’s Address Resolution Protocol (ARP) request. If a device does not
respond to the request, it is removed from the list.
IPv6 NDP Table displays all IPv6 Neighbor Discovery Protocol (NDP) devices
connected to the device’s local link.
The Port Statistics page displays detailed port activity.
To view port statistics, choose Status > Port Statistics.
To refresh the page at regular intervals, choose a refresh rate from the Refresh
Rate drop-down list.
To show the bytes in kilobytes (KB) and the numerical data in rounded-up form,
check the Show Simplified Statistic Data box and click Save. By default, byte
data is displayed in bytes and other numerical data is displayed in long form.
To reset the port statistics counters, click Clear Count.
The Port Statistics page displays this information:
2
InterfaceName of the network interface.
PacketNumber of received/sent packets.
ByteNumber of received/sent bytes of information per second.
ErrorNumber of received/sent packet errors.
DroppedNumber of received/sent packets that were dropped.
MulticastNumber of multicast packets sent over this radio.
CollisionsNumber of signal collisions that occurred on this port. A
collision occurs when the port tries to send data at the
same time as a port on another router or computer that is
connected to this port.
Viewing the Mobile Network Status
The mobile network statistics about the mobile 3G/4G network and
communication device (dongle) configured on the device.
To view the mobile network status, choose Status > Mobile Network. The
following information is displayed:
•Connection—Device connected to the guest network.
•Internet IP Address—IP address assigned to the USB device.
Configuring WAN properties for an IPv4 network differs depending on which type
of Internet connection you have.
Configuring DHCP (Automatic Configuration)
If your Internet Service Provider (ISP) uses Dynamic Host Control Protocol (DHCP)
to assign you an IPaddress, you receive an IP address that is dynamically
generated each time you log in.
3
To configure DHCP WAN settings:
STEP 1 Choose Networking > WAN.
STEP 2 From the Internet Connection Type drop-down list, choose Automatic
Configuration - DHCP.
STEP 3 From the DNS Server Source drop-down list, choose one of the following ways to
set the DNS server address:
•If y ou alr eady have DNS server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary addresses.
•If you do not have DNS server addresses from your ISP, choose Get
Dynamically from ISP.
•To use the DNS servers provided by OpenDNS (208.67.222.222,
208.67.220.220) to resolve your web addresses, choose Use OpenDNS.
STEP 1 Choose Networking > WAN.
STEP 2 From the Internet Connection Type drop-down menu, choose Static IP.
STEP 3 Enter this information:
3
Configuring Static IP
If your ISP assigned you a permanent IP address, perform the following steps to
configure your WAN settings:
Internet IP AddressIP address of the WA N port.
Subnet maskSubnet mask of the WAN port.
DNS Server SourceThe DNS server address. If you already have DNS
server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary
addresses in the Static DNS 1 and Static DNS 2
fields.
To use the DNS servers provided by OpenDNS
(208.67.222.222, 208.67.220.220) to resolve your
web addresses, choose Use OpenDNS.
Default GatewayIP address of the default gateway.
STEP 4 Click Save.
Configuring PPPoE
To configure the Point-to-Point Protocol over Ethernet (PPPoE) settings:
STEP 1 Choose Networking > WAN.
STEP 2 From the Internet Connection Type drop-down menu, choose PPPoE.
STEP 3 Select a PPPoE profile or click Configure Profile to create a new profile.
STEP 4 On the PPPoE Profiles page, enter the following information (you might nee d to
contact your ISP to obtain your PPPoE login information):
UsernameThe username assigned by the ISP.
PasswordThe password assigned by the ISP.
DNS Server SourceThe DNS server address. If you already have DNS
server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary
addresses in the Static DNS 1 and Static DNS 2
fields.
To get DNS server addresses from your ISP,
choose Get Dynamically from ISP.
To use the DNS servers provided by OpenDNS
(208.67.222.222, 208.67.220.220) to resolve your
web addresses, choose Use OpenDNS.
Connect on DemandSelect this option if your ISP charges based on the
amount of time that you are connected. When you
select this option, the Internet connection is on only
when traffic is present. If the connection is idle—
that is, no traffic is flowing—the conne ction is
closed. If you click Connect on Demand, enter the
number of minutes after which the connection
shuts off in the Max Idle Time field.
Keep AliveWhen you select this option, the Internet
connection is always on. In the Redial Period field,
enter the number of seconds after which the
device attempts to reconnect if it is disconnected.
Authentication TypeAuto-negotiation—The server sends a
configuration request specifying the security
algorithm set on it. The devic e then sends back
authentication credentials with the security type
sent by the server.
PAP—Password Authentication Protocol (PAP)
used by Point-to-Point Protocol to connect to the
ISP.
CHAP—Challenge Handshake Authentication
Protocol (CHAP) requires that both the client and
server know the plaintext of the secret to use ISP
services.
MS-CHAP or MS-CHAPv2—The Microsoft
version of CHAP used to access ISP services.
STEP 5 Click Save.
Configuring PPTP
To configure the PPTP settings:
STEP 1 Choose Networking > WAN.
STEP 2 From the Internet Connection Type drop-down menu, choose PPTP.
STEP 3 Enter this information:
Internet IP AddressIP address of the WA N port.
Subnet maskSubnet mask of the WAN port.
Default Gateway IP address of the default gateway.
PPTP ServerIP address of the Point-To-Point Tunneling Protocol
server.
UsernameThe username assigned to you by the ISP.
PasswordThe password assigned to you by the ISP.
Connect on DemandSelect this option if your ISP charges based on the
amount of time that you are connected. When you
select this option, the Internet connection is on only
when traffic is present. If the connection is idle—
that is, no traffic is flowing—the conne ction is
closed. If you click Connect on Demand, enter the
number of minutes after which the connection
shuts off in the Max Idle Time field.
Keep AliveWhen you select this option, the Internet
connection is always on. In the Redial period field,
enter the number of seconds after which the
device attempts to reconnect, if it is disconnected.
Authentication TypeChoose the authentication typ e:
Auto-negotiation—The server sends a
configuration request specifying the security
algorithm set on it. The devic e then sends back
authentication credentials with the security type
sent earlier by the server.
PAP—The device uses the Password
Authentication Protocol (PAP) to connect to the ISP.
CHAP—The device uses the Challenge Handshake
Authentication Protocol (CHAP) when connecting
with the ISP.
MS-CHAP or MS-CHAPv2—The device uses
Microsoft Challenge Handshake Authentication
Protocol when connecting with the ISP.
Service NameEnter a name for the new PPTP service.
MPPE EncryptionCheck the Enable check box to enable Microsoft
Point-to-Point Encryption for the PPTP connection.
DNS Server SourceThe DNS server address. If you already have DNS
server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary
addresses in the Static DNS 1 and Static DNS 2
fields.
To get DNS server addresses from your ISP,
choose Get Dynamically from ISP.
To use the DNS servers provided by OpenDNS
(208.67.222.222, 208.67.220.220) to resolve your
web addresses, choose Use OpenDNS.
Configuring L2TP
To configure L2TP settings:
STEP 1 Choose Networking > WAN.
STEP 2 From the Internet Connection Type drop-down menu, choose L2TP.
STEP 3 Enter this information:
Internet IP AddressThe IP address of the WAN port.
Subnet maskThe subnet mask of the WAN port.
Default GatewayThe IP address of the default gateway.
L2TP ServerThe IP address of the L2TP server.
VersionThe L2TP version that you want to use. If you select
version 3, enter the vendor ID, and the virtual circuit
ID.
Cookie LengthThe size of the cookie in the L2TP v3 data packet,
Vendor I DThe vendor ID contained in the AVP encoding
format for L2TP.
To use the IETF-adopted attribute values in the A VP,
select Standard.
To implement Cisco’s L2TP extensions and private
attribute values, select Cisco.
Virtual Circuit IDThe identifier for the Layer 2 circuit over which
L2TP data packets are carried. This information is
required if you selected Cisco as the Vendor ID for
L2TP v3.
UsernameEnter your username assigned to you by the ISP.
PasswordEnter your password assigned to you by the ISP.
Connect on DemandSelect this option if your ISP charges based on the
amount of time that you are connected. When you
select this option, the Internet connection is on only
when traffic is present. If the connection is idle—
that is, no traffic is flowing—the conne ction is
closed. If you click Connect on Demand, enter the
number of minutes after which the connection
shuts off in the Max Idle Time field.
Keep AliveWhen you select this option, the Internet
connection is always on. In the redial period field,
enter the number of seconds after which the
device attempts to reconnect if it is disconnected.
Authentication TypeAuto-negotiation—The server sends a
configuration request specifying the security
algorithm set on it. The devic e then sends back
authentication credentials with the security type
sent by the server.
PAP—Password Authentication Protocol (PAP) is
used to connect to the ISP.
CHAP—Challenge Handshake Authentication
Protocol (CHAP) is used to connect to the ISP.
MS-CHAP or MS-CHAPv2—Microsoft Challenge
Handshake Authentication Protocol is used to
connect to the ISP.
Service NameEnter a name for the new L2TP service.
MPPE EncryptionCheck Enable to enable Microsoft Point-to-Point
Encryption for the L2TP connection.
DNS Server SourceThe DNS server address. If you already have DNS
server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary
addresses in the Static DNS 1 and Static DNS 2
fields.
To get DNS server addresses from your ISP,
choose Get Dynamically from ISP.
To use the DNS servers provided by OpenDNS
(208.67.222.222, 208.67.220.220) to resolve your
web addresses, choose Use OpenDNS.
STEP 4 Click Save.
Configuring Optional Network Settings
To configure optional settings:
STEP 1 In the Optional Settings section, configure the f ollowing settings:
MTUMaximum transmission unit (MTU) is the size of the
largest packet that can be sent over the network.
Unless a change is required by your ISP, we
recommend that you choose Auto. The default
MTU size is 1500 bytes.
If your ISP requires a custom MTU setting, choose
Manual and enter the MTU size.
SizeThe custom MTU size. The standard MTU value for
Ethernet networks is usually 1500 bytes. For
PPPoE connections, the value is 1492 bytes.
Untagged VLANCheck the box to enable VLAN tagging. When
enabled (the default), all traffic is tagged with a
VLAN ID.
By default, all traffic on the device uses VLAN 1, the
default untagged VLAN. All traffic is untagged until
you disable the untagged VLAN, change the
untagged traffic VLAN ID, or change the VLAN ID.
Untagged VLAN IDA number between 1 and 4094 for the untagged
VLAN ID. The default is 1. Traffic on the VLAN that
you specify in this field is not tagged with a VLAN
ID when forwarded to the network.
VLAN 1 is the default untagged VLAN.
AP Management VLANThe VLAN associated with the IP address you use
to access the device when it is configured as an
access point.
STEP 2 Click Save.
If you create additional VLANs, for security
reasons, choose a value that corresponds with the
VLAN configured on other switches in the network.
You may need to change the management VLAN to
limit access to Device Manager.
Choose Networking > WAN > Mobile Network to configure to configure the
device to connect to a Mobile Broadband USB modem that is connected to its
USB interface.
Configuring Global Mobile Network Settings
To configure global settings for supported USB devices:
STEP 1 Connect the USB modem. If the modem is supported, it is automatically detected
and appears on the Mobile Network page.
STEP 2 Select Auto or Manual connection mode. Ethernet Connection Recovery works
only if the Connect Mode is set to Auto.
3
•To enable your modem to establish a connection automatically, select Auto
mode. If you select Auto, set a Connect on Demand time or select Keep Alive.
Connect on Demand terminates the Internet connection after it is inactive for
the period of time specified in the Max Idle Time field.
If your Internet connection is terminated due to inactivity, the modem
automatically reestablishes a connection when a user attempts to acces s
the Internet. In the Max Idle Time field, enter the number of minutes of idle
time that can elapse before the Int ernet connection terminat es. Select Keep
Alive to keep the connection active at all times.
•To connect or disconnect your modem connection manually, select Manual
mode.
The device displays the current modem connection status that includes initializing,
connecting, disconnecting, or disconnected.
STEP 3 Verify that the Card Status field shows your mobile card is Connected.
STEP 1 Enter information in the following fields:
3
Configuring Mobile Network Settings Manually
To change mobile netw ork parameters in the Mobile Network Setup area, click
the Manual radio button. The device automatically detects supported modems
and lists the appropriate configuration parameters. To override global parameters,
select Manual.
FieldDescription
Access point Name
(APN)
Dial NumberDial number provided by your mobile network service
Username
Password
SIM CheckSIM card check enable or disable.
SIM PINPIN code associated with your SIM card. This field is
Server NameName of the server for the Internet connection (if
AuthenticationAuthentication used by your service provider. The value
Internet network that the mobile device is connecting to.
Enter the access point name provided by your mobile
network service provider. If you do not know the name
of the access p o int, contact your service provider.
provider for the Internet connection.
User name and password provided by your mobile
network service provider.
only displayed for GSM SIM cards.
You can modify the SIM PIN in either Auto or Manual
mode.
provided by your service provider).
can be changed by choosing the authentication type
from the drop-down list. The default is Auto. If you do
not know which type of authentication to use, select
Auto.
Server TypeThe most commonly available type of mobile data
service connection based on your area service signal. If
your location supports only one mobile data service,
you can limit your pref err ed option, reducing connection
setup times. The first selection always searches for
HSPDA/3G/UMTS service and switches automatically
to GPRS when it is available.
LTE ServiceL ong-term E volution (LTE) Service setting. Auto chooses
a signal based on the area service signal. 4G only
searches for only 4G signals. 3G only searches for only
3G signals.
Bandwidth Cap Setting
The device monitors the data activity across the mobile network link and when it
reaches a given threshold, sends a notification.
To enable or disable Bandwidth Cap Tracking and set the limits:
STEP 1 Click Enabled or Disabled.
STEP 2 Select the Monthly Renewal Date fr om the dr op-down list to indicate which day of
the month the bandwidth cap is reset .
STEP 3 In the Monthly Bandwidth Cap field, enter the maximum amount of data in
megabytes that is allowed to pass before the device takes an action, such as
sending an email to an administrator.
E-mail Setting
When the bandwidth data limit is reached, an email message can be sent to the
administrator. To set up the target email address, see Configuring Log E-Mailing.
When enabled by checking the box, email is sent when:
•Mobile network usage has exc eeded a given percentage.
•The device fails over to the backup pathway and recovers.
STEP 1 Choose Networking > WAN > Failover & Recovery, to display the Failover &
STEP 2 Select Enable Failover to 3G WAN to enable the mobile network link and set it to
3
•At every interval specified while a mobile network link is active.
Set t ing Failover and Recovery
While both Ethernet and mobile network links are available, only one connection
can be used to establish a W AN link, at a time. When one W AN connection fails, the
device attempts to establish a connection on another interface. This feature is
called Failover. When the primary WAN connection is restored, it reverts to the
original path and ends the backup connection. This feature is called Recovery.
Recovery window.
failover from the Ethernet link. When the Ethernet W AN link is not active, the device
attempts to enable the mobile network link on the USB interface. (If failover is not
enabled, the mobile network link is always disabled.)
STEP 3 Select Enable Recovery back to Ethernet WAN to enable the link to return to the
Ethernet link, dropping the mobile network link. The Connect Mode accessed
through WAN > Mobile Network must be set to Auto to use Ethernet WAN
connection recovery.
STEP 4 In the Failover Check Interval field, enter the fr equency (in seconds) with which the
device must attempt to detect the physical connection or presence of traffic on
the mobile network link. If the link is idle, the device attempts to ping a destination
at this interval. If there is no reply t o the ping pack et, the device assumes the link is
down and retries the Ethernet WAN interface.
STEP 5 In the Recovery Check Interval field, enter the frequency (in seconds) with which
the device must attempt to detect the physical connection or presence of traffic
on the Ethernet WAN link. If the link is idle, the device attempts to ping a
destination at the interval. If there is a reply to the ping pa cket, the device assumes
the link is up and attempts to disable the mobile network link and enable the
Ethernet WAN link.
STEP 6 Click Switch back to Ethernet immediately when Ethernet is available or click
Switch back to Ethernet in a specific time range and enter the start and end time
for the range.
STEP 7 In the Connection Validation Site field, choose the site from which to perform
failover validation. Use the next hop gateway (by default the device pings the
default gateway) or choose a custom site and enter the site IPv4 or IPv6 address.
The WAN Inter face table shows the status of the Ethernet WAN and mobile
network link to the Internet. Click the Status hyper link to view the port detail.
Configuring LAN Settings
The default DHCP and TCP/IP settings work for most applications. If you want
another PC on your network to be the DHCP server, or if you want to manually
configure the network settings of all of your devices, disable DHCP.
Also, instead of using a DNS server that maps Internet domain names (for example,
www.cisco.com) to IP addresses, you can use a Windows Internet Naming Service
(WINS) ser ver. A WINS server is the equivalent of a DNS server, but uses the
NetBIOS protocol to resolve hostnames. The device includes the IP address of the
WINS server in the DHCP configuration the device sends to DHCP clients.
3
If your device is connected to a modem or to another device that has a configured
network on the same subnet (192.168.1.x), it automatically changes the LAN
subnet to a random subnet based on 10.x.x.x, so there is no conflict with the
subnet on the WAN side of the router.
Changing the Device Management IP Address
The local device management IP address of the devic e is static and defaults to
192.168.1.1.
To change the local device management IP address:
STEP 1 Choose Networking > LAN > LAN Configuration.
STEP 2 In the IPv4 section, enter this information:
VLANThe VLAN number.
Local IP AddressLocal LAN IP address of the device. Make sure this
IP address is not in use by another device.
Subnet maskSubnet mask for the local IP address. The default
After changing the IP address of your device, your PC is no longer able to display
Device Manager.
To display
•If DHCP is configured on the device, release and renew your PC IP address.
•Manually assign an IP address to your PC. The address must be on the same
Open a new browser window and enter the new IP address of the device to
reconnect.
Device Manager, do one of the following:
subnetwork as the device. For example, if you change the device IPaddress
to 10.0.0 .1 , assign your PC an IP address in the range of 10.0.0.2 t o 10.0.0 .255.
Configuring DHCP Server
By default, the device functions as a DHCP server to the hosts on the wireless LAN
(WLAN) or wired LAN. It assigns IP addresses, and provides DNS server
addresses.
With DHCP enabled, the device assigns IP addresses to other network devices on
the LAN from a pool of IPv4 addresses. The device tests each address before it is
assigned to avoid duplicate addresses on the LAN.
The default IP address pool is 192.168.1.100 to 192.168.1.149. To set a static IP
address on a network device, use an IP address outside the po ol. For example,
assuming that the DHCP pool is set to the default parameters, static IP addresses
from 192.168.1.2 to 192.168.1.99 in the IP address pool can be used to prevent
conflicts with the DHCP IP address pool.
To configure DHCP settings:
STEP 1 Choose Networking > LAN > LAN Configuration.
STEP 2 (Optional) Select a VLAN to edit from the drop-down list.
STEP 3 In the DHCP Server field, select one of the following options:
EnableAllows the device to act as the DHCP server in the network.
DisableDisables DHCP on the device when you want to manually
configure the IP addresses of all of your network devices.
DHCP RelayRelays the IPaddresses assigned by another DHCP server to
the network devices .
If you enabled the device DHCP server, enter this information:
Starting IP Addre ssThe first address in the IP address pool. Any DHCP
client joining the LAN is assigne d an IP address in
this range.
Maximum Number of
DHCP Users
IP Address Range(Read-only) The range of IP addresses available to
Client Lease timeDuration (in hours) that IP addresses are leased to
Static DNS 1IP address of the primary DNS server.
Static DNS 2IP address of the secondary DNS server.
Static DNS 3IP address of the tertiary DNS server.
WINSIP address of the primary WINS server.
STEP 4 If you selected DHCP Relay , ent er the addr ess of the relay gat ewa y in the Remote
DHCP Server field. The relay gateway transmits DHCP messages to network
STEP 1 Choose Networking > LAN > VLAN Membership.
STEP 2 Click Add Row.
STEP 3 Enter the following information:
3
Configuring VLANs
A virtual LAN (VLAN) is a group of endpoints in a network that are associated by
function or other shared characteristics. Unlike LANs that are typically
geographically based, VLANs can group endpoints without regard to the physical
location of the equipment or users.
The device has a default VLAN (VLAN 1) that cannot be deleted. You can create up
to four other VLANs on the device.
To create a VLAN:
VLAN IDNumerical VLAN ID to assign to endpoints in the VLAN
membership. The number you enter must be between
3 to 4094. VLAN ID 1 is reserved for the default VLAN,
and is used for untagged frames received on the
interface.
DescriptionA description that identifies the VLAN.
Port 1
Port 2
Port 3
Port 4
You can associate VLANS on the device to the LAN
ports on the device. By default, all LAN ports belong to
VLAN1. You can edit these ports to associate them
with other VLANS. Choose the outgoing frame type for
each port:
Untagged—The interface is an untagged member of
the VLAN. Frames of the VLAN are sent untagged to
the port VLAN.
Tagged—The port is a tagged member of the VLAN.
Frames of the VLAN are sent tagged to the port VLAN.
Excluded—The port is currently not a member of the
VLAN. This is the default for all the ports when the
VLAN is first created.
STEP 1 Choose Networking > LAN > Static DHCP.
STEP 2 From the VLAN drop-down menu, choose a VLAN number.
3
To edit the settings of a VLAN, select the VLAN and click Edit. To delete a select ed
VLAN, click Delete. Click Save to apply changes.
Configuring Static DHCP
You can configure your router to assign a specific IP address to a client device
with a specific MAC address.
To configure static DHCP:
STEP 3 Click Add Row.
STEP 4 Enter the following information:
DescriptionDescription of the client.
IP AddressIP address you want assigned to the client device. The IP
address assigned should be outside the pool of the DHCP
addresses.
Static DHCP assignment means the DHCP server assigns
the same IP address to a defined MAC address every time
the client device is connected to the network.
The DHCP server assigns the reserved IP address when
the client device using the corresponding MAC address
requests an IP address.
MAC AddressMAC address of the client device.
The format for a MAC address is XX:XX:XX:XX:XX:XX
where X is a number from 0 to 9 (inclusive) or a letter
between A and F (inclusive).
To edit the settings of a static DHCP client, select the client and click Edit. To
delete a selected DHCP client, click Delete. Click Save to apply the changes.
STEP 1 In the row of the connected device, check Add to Static DHCP.
STEP 2 Click Save.
3
Viewing DHCP Leased Clients
You can view a list of endpoints on the network (identified by hostname, IP
address, or MAC address) and see the IP addresses assigned to them by the
DHCP server. The VLAN of the endpoints is also displayed.
To view the DHCP clients, choose Networking > LAN > DHCP Leased Client.
For every VLAN defined on the device, a table displays a list of the clients
associated with the VLAN.
To as sign a static IP address to one of the connected devices:
The DHCP server on the device always assigns the IP address shown when the
device requests an IP address.
Configuring a DMZ Host
Your device supports demilitarized zones (DMZ). A DMZ is a subnetwork that is
open to the public but behind the firewall. A DMZ allows you to redirect packets
going to your WAN port IP address to a particular IP address in your LAN.
We recommended that you place hosts that must be exposed to the W AN ( such as
web or e-mail servers) in the DMZ network. You can configure firewall rules to
allow access to specific services and ports in the DMZ from both the LAN or W AN.
In the event of an attack on any of the DMZ nodes, the LAN is not necessarily
vulnerable.
You must configure a fixed (static) IP address for the endpoint that you designate
as the DMZ host. You should assign the DMZ host an IP address in the same
subnet as the device LAN IP address, but it cannot be identical to the IP address
given to the LAN interface of this gateway.
To configure DMZ:
STEP 1 Choose Networking > LAN > DMZ Host.
STEP 2 Check Enable to enable DMZ on the network.
STEP 3 From the VLAN drop-down menu, choose the ID of the VLAN where DMZ is
STEP 4 In the Host IP Address field, enter the IP address of the DMZ host. The DMZ host
STEP 5 Click Save.
3
enabled.
is the endpoint that receives the redirected packets.
Configuring RSTP
Rapid Spanning Tree Protocol (RSTP) is a network protocol that prevents loops in
the network and dynamically reconfigures which physical links should forward
frames. To configure Rapid Spanning Tree Protocol (RTSP):
STEP 1 Choose Networking > LAN > RSTP.
STEP 2 Enter the following information:
System PriorityChoose the system priority from the drop-down
menu. You can choose from a system priority from
0 to 61440 in increments of 4096. Valid values are
0, 4096, 8192, 12288, 16384, 20480, 24576,
28672, 32768, 40960, 45056, 49152, 53248,
57344, and 61440.
The lower the system priority, the more likely the
device is to become the root in the spanning tree.
The default is 327688.
Hello TimeThe hello time is the ti me period that the r oot of the
spanning tree waits before sending hello
messages. Enter a number from 1 to 10 . The default
is 2.
Max AgeThe max age is the time period that the router waits
to receive a hello message. If the max age is
reached, the router tries to change the spanning
tree. Enter a number from 6 to 40. The default is 20.
LinkThe port speed. If no device is connected to the
port, this field displays Down.
ModeChoose from the drop-down menu one of the
following port speeds:
•Auto Negotiation—The device and the
connect ed device choose a common speed.
•10Mbps Half—10 Mbps in both directions,
but only one direction at a time.
•10Mbps Full—10 Mbps in both directions
simultaneously.
•100Mbps Half—100 Mbps in both
directions, but only one direction at a time.
Jumbo FrameCheck to enable jumbo frames on the device and
Flow ControlCheck to enable flow control for this port.
STEP 3 Click Save.
•100Mbps Full—100 Mbps in both
directions simultaneously.
send frames within the LAN containing up to 9,000
bytes of data per frame. A standard Ethernet frame
contains 1,500 bytes of data.
Flow control is the process of managing the rate of
data transmission between two nodes to prevent a
fast sender from outrunning a slow receiver. It
provides a mechanism for the receiver to control
the transmission speed, so that the receiving node
is not overwhelmed with data from the transmitting
node.
Configuring Link Aggregation
Use the Link Aggregation page to group multiple Ethernet links into a single logical
channel. Link aggregation groups improve the cost effectiveness of your device
by increasing cumulative bandwidth without requiring hardware upgrades, and
facilitates easy rerouting in case of a single port or cable failure.
STEP 1 Choose Networking > LAN > Link Aggregation. The Port Status section displays
the mode associated with each port on the device and the status.
STEP 2 In the Link Aggregation Setting Table section, check the check box for each port to
include it in the group.
STEP 3 Click Save.
Cloning the MAC Address
Sometimes, you might need to set the MAC address of the device W A N port to be
the same MAC address as your PC or some other MAC address. This is called
MAC address cloning.
3
For example, some ISPs register your computer card MAC address when the
service is first installed. When you place a router behind the cable modem or DSL
modem, the MAC address from the device WAN port is not recognized by the ISP.
In this case, to configure your device to be recognized by the ISP, you can clone
the MAC address of the WAN port to be the same as your computer MAC address.
To configure a MAC address clone:
STEP 1 Choose Networking > MAC Address Clone.
STEP 2 In the MAC Address Clone field, check Enable.
STEP 3 To set the MAC address of the device WAN port, do one of the following:
•To set the MAC address of the WA N port to your PC MAC address, click
Clone My PC’s MAC.
•To specify a different MAC address, enter it in the MAC Address field.
Use the Routing page to configure the operating mode and other routing options
for your d evice.
Configuring the Operating Mode
To configure the operating mode:
STEP 1 Choose Networking > Routing.
STEP 2 In the Operating Mode field, select one of the following options:
GatewayTo set the device to act as a gateway.
3
(Recommended)
Router(For advanced users only) To set the devic e to act
STEP 3 Click Save.
Configuring Dynamic Routing
Routing Information Protocol (RIP) is an Interior Gateway Protocol (IGP) that is
commonly used in internal networks. It allows the router to exchange its routing
information automatically with other routers, and allows it to dynamica lly adjust its
routing tables and adapt to changes in the network.
Keep this default setting if the device is hosting
your network connection to the Internet and is
performing routing functions.
as a router.
Select this option if the device is on a network with
other routers.
Enabling the Router mode disables NAT (Network
Address Translation) on the device.
Dynamic Routing (RIP) enables the device to automatically adjus t to physical
changes in the network layout and exchange routing tables with the other routers.
The router determines the network packets’ route based on the fewest number of
hops between the source and the destination.
STEP 1 Choose Networking > Routing.
STEP 2 Configure the following settings:
3
To configure dynamic routing:
RIPCheck Enable to enable RIP. This allows the device
to use RIP to route traffic.
RIP Send Packet VersionSelect the RIP Send Packet Version (RIPv1 or
RIPv2).
The version of RIP used to send routing updates to
other routers on the network depends on the
configuration settings of the other routers. RIPv2 is
backward compatible with RIPv1.
RIP Recv Packet VersionChoose the RIP Receive Packet Version.
STEP 3 Click Save.
Configuring Inter VLAN Routing
To allow an end station in one VLAN to communicate with an end station in another
VLAN, check the Inter VLAN Routing Enable check box.
Configuring Static Routing
You can configure static routes to direct packets to the destination network. A
static route is a predetermined pathway that a packet must travel to reach a
specific host or network.
Some ISPs require static routes to build your routing table instead of using
dynamic routing protocols. Static routes do not require CPU resources to
exchange routing information with a peer router.
You can also use static routes to reach peer routers that do not support dynamic
routing protocols. Static routes can be used together with dynamic routes. The
device supports up to 30 static routes.
Be careful not to introduce routing loops in your network.
STEP 1 Choose Networking > Routing.
STEP 2 From the Route Entries drop-down menu, choose a route entry.
STEP 3 Configure the following settings for the selected route entry:
3
To configure static routing:
To delete the route entry, click Delete This Entry.
Enter Route NameEnter the name of the route.
Destination LAN IPEnter the IP address of the destination LAN.
Subnet MaskEnter the subnet mask of the destination network.
GatewayEnter the IP address of the gateway used for this
InterfaceSelect the interface to which packets for this route
STEP 4 Click Save.
Viewing the Routing Table
The routing table contains information about the topology of the network
immediately around it.
route.
are sent:
•LAN & Wireless—Click this button to dir ect pack ets
to the LAN and wireless network.
•Internet (WAN)—Click this button to direct packets
to the Internet (WAN).
To view the routing information on your network, choose Networking > Routing Table and choose one of the following:
•Show IPv4 Routing Table—The routing table is displayed with the fields
configured in the Networking > Routing page.
•Show IPv6 Routing Table—The routing table is displayed with the fields
Dynamic DNS (DDNS) is an Internet service that allows routers with varying public
IP addresses to be located using Internet domain names. To use DDNS, you must
set up an account with a DDNS provider such as DynDNS.com, TZ O.com,
3322.org, or noip.com.
The router notifies dynamic DNS servers of changes in the WAN IP address, so
that any public services on your network can be accessed by using the domain
name.
To configure DDNS:
STEP 1 Choose Networking > Dynamic DNS.
STEP 2 The DDNS Service Table section lists the DDNS s e rvices that you can enable on
the device.
3
STEP 3 Check the check box for the service you want to enable and click Edit.
STEP 4 Check the Enable check box for the service.
STEP 5 Configure this information:
Username/E-mail
Address
PasswordPassword of the DDNS account.
Host / Domain NameHostname of the DDNS server or the name of the
Internet IP Address(Read-only) Internet IP address of your device.
Status(Read-only) Indicates that the DDNS update has
STEP 6 Click Te st Configuration, to test the DDNS configuration.
The username of the DDNS account or the e-mail
address that you used to create the DDNS account.
domain that is used to access the network
completed successfully or the a ccount update
information sent to the DDNS server failed.
Wide area network configuration properties are configurable for both IPv4 and
IPv6 networks. You can enter information about your Internet connection type and
other parameters in these pages.
To select an IP mode:
STEP 1 Choose Networking > IP Mode.
STEP 2 From the IP Mode drop-down menu, choose one of the following options:
LAN:IPv4, WAN:IPv4To use IPv4 on the LAN and WAN ports.
LAN:IPv6, WAN:IPv4To use IPv6 on the LAN ports and IPv4 on the WAN
3
ports.
LAN:IPv6, WAN:IPv6To use IP v6 on the LAN and WAN ports.
LAN:IPv4+IPv6,
WAN:IPv4
LAN:IPv4+IPV6,
WAN:IPv4+IPv6
LAN:IPv4, WAN:IPv6To use IPv4 on the LAN and IPv6 on the WAN ports.
STEP 3 (Optional) If you are using 6to4 tunneling, which allows IPv6 packets to be
transmitted over an IPv4 network, do the following:
a. Click Show Static 6to4 DNS Entry.
b. In the Domain and IP fields, enter up to five domain-to-IP mappings.
The 6to4 tunneling featur e is typically used when a site or end user wants to
connect to the IPv6 Internet using the existing IPv4 network.
STEP 4 Click Save.
To use IPv4 and IPv6 on the LAN ports and IPv4 on
the WAN ports.
To use IPv4 and IPv6 on both the LAN and WAN
ports.
Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) intended
to succeed Internet Protocol version 4 (IPv4). Configuring WAN proper ties for an
IPv6 network depends on the type of internet connection that you have.
Configuring the IPV6 WAN Connection
You can configure your device to be a DHCPv6 client of the ISP for this WAN or to
use a static IPv6 address provided by the ISP.
To configure IPv6 WAN settings on your device, you must first set the IP mode to
one of the following modes:
3
•LAN:IPv6, WAN:IPv6
•LAN:IPv4+IPv6, WAN:IPv4
•LAN:IPv4+IPv6, WAN:IPv4+IPv6
See Configuring the IP Mode for instructions on how to set the IP mode.
Configuring SLAAC
To self-assign an address based on the IPv6 prefix, configure the device to use
use Stateless Address Auto-Configuration (SLAAC) for IPv6 client address
assignment.
To use SLA AC:
STEP 1 Choose Networking > IPv6 > IPv6 WAN Configuration.
STEP 2 In the WAN Connection Type field, select SLAAC. For stateless DHCP, it is not
necessary to have a DHCPv6 server available at the ISP. Instead, an ICMPv6
discover message originating from your device is used for auto-configuration.
STEP 3 Click Save.
Configuring DHCPv6
If your ISP provides you with a dynamically assigned address, configure the
device to be a DHCPv6 client.
STEP 1 Choose Networking > IPv6 > IPv6 WAN Configuration.
STEP 2 In the WAN Connection Type field, select Automatic Configuration-DHCPv6.
STEP 3 To automate assigning prefixes to your device (the DHCP client), select the Prefix
STEP 4 Click Save.
3
To configure the device to be a DHCPv6 client:
The gateway connects to the ISP's DHCPv6 server for a leased address.
Delegation Enable radio button.
Configuring a Static IPv6 WAN Address
If your ISP assigns you a fixed address to access the WAN, configure the device to
use a static IPv6 address.
To configure a static IPv6 WAN address:
STEP 1 Choose Networking > IPv6 > IPv6 WAN Configuration.
STEP 2 From the WAN Connection Type menu, select Static IPv6.
STEP 3 Enter this information:
IPv6 AddressIPv6 address of the WAN port.
IPv 6 Pre f ix LengthLength of the IPv6 prefix (typically defined by the
ISP). The IPv6 network (subnet) is identified by the
initial bits of the address called the prefix. All hosts
in the subnetwork have the identical prefix.
For example, in the IPv6 address
2001:0DB8:AC10:FE01::, the prefix is 2001.
Default IPv6 GatewayIPv6 address of the default gateway. This is
typically the IP address of the server at the ISP.
Static DNS 1IP address of the primary IPv6 DNS server.
Static DNS 2IP address of the secondary IPv6 DNS ser ver.
STEP 1 Choose Networking > IPv6 > IPv6 WAN Configuration.
STEP 2 In the WAN Connection Type field, choose PPPoE IPv6.
STEP 3 Enter the fo llowing inf ormation (it might be necessary to contact your ISP to obtain
3
Configuring PPPoE IPv6 Settings
You can run IPv4 PPPoE, IPv6 PPPoE, or both. If you run both, your IPv6 WAN
PPPoE settings must match your IPv4 WAN PPPoE settings. If they do not match, a
message is displayed asking if you want to set the IPv6 protocol to match the IPv4
protocol. See Configuring PPPoE.
To configure the PPPoE IPv6 settings:
your PPPoE login information):
UsernameUsername assigned to you by the ISP.
PasswordPassword assigned to you by the ISP.
Connect on DemandIf your ISP charges based on the amount of time
that you are connected, select the radio button.
When selected, the Internet connection is active
only when traffic is present. If the conne ction is
idle—that is, no traffic is flowing—the connection is
closed. In the Max Idle Time field, enter the number
of minutes that must elapse with no traffic detected
on the link before the link is shut down.
Keep AliveKeeps the WAN link up by sending a keep-alive
message through the port. In the redial period field,
enter the number of seconds after which the
device attempts to reconnect if it is disconnected.
request specifying the security algorithm set on
the server. The device replies with its
authentication credentials, including the security
type sent by the server.
PAP—Use the Password Authentication Protocol
(PAP) to connect to the ISP.
CHAP—Use Challenge Handshake Authentication
Protocol (CHAP) to connect with the ISP.
MS-CHAP or MS-CHAPv2—Use Microsoft
Challenge Handshake Authentication Protocol to
connect to the ISP.
Service NameName that your ISP might require to log onto the
PPPoE server.
MTUMaximum transmission unit is the size of the largest
packet that can be sent over the network.
Unless a change is required by your ISP, we
recommend that you choose Auto. The standard
MTU value for Ethernet networks is 1500 bytes. For
PPPoE connections, the value is 1492 bytes. If your
ISP requires a custom MTU setting, choose
Manual.
Size MTU size. If your ISP requires a custom MTU
setting, enter the MTU size.
Address ModeDynamic or static address mode. If you choose
static, enter the IPv6 address in the next field.
IPv 6 Pre f ix LengthIPv6 prefix length.
Default IPv6 GatewayIP address of the default IPv6 gateway.
Static DNS 1IP address of the primary DNS server.
Static DNS 2IP address of the secondary DNS server.
In the IPv6 mode, the LAN DHCP server is enabled by default (similar to the IPv4
mode). The DHCPv6 server assigns IPv6 addresses from configured address
pools that use the IPv6 prefix length assigned to the LAN.
To configure IPv6 LAN settings on your device, you must first set the IP mode to
one of the following modes:
•LAN:IPv6, WAN:IPv4
•LAN:IPv6, WAN:IPv6
•LAN:IPv4+IPv6, WAN:IPv4
•LAN:IPv4+IPv6, WAN:IPv4+IPv6
See Configuring the IP Mode for more information on how to set the IP mode.
To configure IPv6 LAN settings:
STEP 1 Choose Networking > IPv6 > IPv6 LAN Configuration.
STEP 2 Enter the following information to configure the IPv6 LAN address:
IPv6 AddressEnter the IPv6 address of the device.
The default IPv6 address for the ga teway is f ec0::1
(or FEC0:0000:0000:0000:0000:0000:0000:0001).
Y o u can change this 128-bit IPv6 address based on
your network requirements.
IPv 6 Pre f ix LengthEnter the IPv6 prefix length.
The IPv6 network (subnet) is identified by the initial
bits of the address called the prefix. By default, the
prefix is 64 bits long.
All hosts in the network have the identical initial bits
for their IPv6 address; you set the number of
common initial bits in the network addresses in this
field.
STEP 3 Click Save or continue to configure IPv6 DHCP LAN sett ings.
STEP 4 Enter the following information to configure the DHCPv6 settings:
When enabled, the device assigns an IP address
within a specified range and provides additional
information to any LAN endpoint that requests
DHCP addresses.
Domain Name(Optional) Domain name of the DHCPv6 server.
Serv er Pre ferenc eServer preference level of this DHCP server. DHCP
advertise messages with the highest server
preference value to a LAN host are preferred over
other DHCP server advertise messages.
The default is 255.
Static DNS 1 IPv6 address of the primary DNS server on the ISP
IPv6 network.
Static DNS 2 IPv6 address of the secondary DNS server on the
ISP IPv6 network.
Client Lease TimeClient lease time duration (in seconds) for which
IPv6 addresses are leased to endpoints on the
LAN.
STEP 5 Choose Networking > IPv6 > IPv6 LAN Configuration.
STEP 6 In the IPv 6 Address Pools Table, click Add Row.
STEP 7 Enter this information:
Start AddressStarting IPv6 address of the pool.
End AddressEnding IPv6 address of the pool.
IPv 6 Pre f ix LengthPrefix length that determines the number of
common initial bits in the network addresse s.
STEP 8 Click Save.
To edit the settings of a pool, select the pool and click Edit. To delete a selected
pool, click Delete. Click Save to apply changes.
You can configure static routes to direct packets to the destination network. A
static route is a predetermined pathway that a packet must travel to reach a
specific host or network.
Some ISPs require static routes to build a routing table instead of using dynamic
routing protocols. Static routes do not require CPU resources to exchange routing
information with a peer router.
You can also use static routes to reach peer routers that do not support dynamic
routing protocols. Static routes can be used together with dynamic routes. Be
careful not to introduce routing loops in your network.
To create a static route:
STEP 2 In the list of static routes, click Add Row.
STEP 3 Enter this information:
NameRoute name.
Destination IPv6 address of the destination host or network for
this route.
Prefix LengthNumber of prefix bits in the IPv6 address that define
the destination subnet.
GatewayIPv6 address of the gateway through which the
destination host or network can be reached.
InterfaceInterface for the route: LAN, WAN, or 6to4.
MetricPriority of the route. Choose a value between 2 and 15.
If multiple routes to the same destination exist, the
route with the lowest metric is used.
ActiveCheck to make the route active. When you add a route
in an inactive state, it is listed in the routing table, but is
not used by the device.
Entering an inactive route is useful if the route is not
available when you add the route. When the network
becomes available, you can enable the route.
To edit the settings of a route, select the route and click Edit. To delete a selected
route, click Delete. Click Save to apply changes.
Configuring Routing (RIPng)
RIP Next Generation (RIPng) is a routing protocol based on the distance vector
(D-V) algorithm. RIPng uses UDP packets to exchange routing information through
port 521.
RIPng uses a hop count to measure the distance to a destination. The hop count is
referred to as metric, or cost. The hop count from a router to a directly connected
network is 0. The hop count between two directly connected routers is 1. When
the hop count is greater than or equal to 16, the destination network or host is
unreachable.
By default, the routing update is sent every 30 seconds. If the router receives no
routing updates from a neighbor after 180 seconds, the routes learned from the
neighbor are considered as unreachable. After another 240 seconds, if no routing
update is received, the router removes these routes from the routing table.
On your device, RIPng is disabled by default.
To configure RIPng:
STEP 1 Select Networking > IPv6 > Tunneling.
STEP 2 In the 6 to 4 Tunneling field, check Enable.
STEP 3 Choose the type of tunneling:
3
Configuring Tunneling
IPv6-to-IPv4 tunneling (6-to-4 tunneling) allows IPv6 packets to be transmitted
over an IPv4 network. IPv4 to IPv6 tunneling (4-t o-6 tunneling) allows IPv4 packets
to be transmitted over an IPv6 network.
6 to 4 Tunneling
6-to-4 tunneling is typically used when a site or end user wants to connect to the
IPv6 Internet using the existing IPv4 network.
To configure 6-to-4 tunneling:
•6to4
•6RD (Rapid Deployment)
•ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) - Choose Auto or
Manual.
STEP 4 For 6RD Tunneling, cho ose Auto or Manual. If you choose Manual, enter the
following information:
•IPv6 Prefix
•IPv6 Prefix Length
•Border Relay
•IPv4 Mask Length
STEP 5 For ISATAP Tunneling, choose Auto or Manual. If you choose Manual, enter the
STEP 1 Select Networking > IPv6 > Tunneling.
STEP 2 In the 4 to 6 Tunneling field, check the Enable box.
STEP 3 Enter the local WAN IPv6 address on the device.
STEP 4 Enter the remote IPv6 address, or the IP address of the remote endpoint.
STEP 5 Click Save.
3
4 to 6 Tunneling
To configure 4-to-6 tunneling:
Viewing IPv6 Tunnel Status
To view IPv6 tunnel status:
STEP 1 Choose Networking > IPv6 > IPv6 Tunnels Status.
STEP 2 Click Refresh to display the most up-to-date information.
This page displays information about the automatic tunnel set up through the
dedicated WAN interface. The table shows the name of tunnel and the IPv6
address that is created on the device.
Configuring Router Advertisement
The Router Advertisement Daemon (RADVD) on the device listens for router
solicitations in the IPv6 LAN and responds with router advertisements as required.
This is stateless IPv6 auto-configuration, and the device distributes IPv6 prefixes
to all nodes on the network.
To configure the RADVD:
STEP 1 Choose Networking > IPv6 > Router Advertisement.
STEP 2 Enter this information:
Advertisements (RAs) to all interfaces belonging to
the multicast group.
Unicast only—Restrict advertisements to
well-known IPv6 addresse s only (RAs are sent to
the interface belonging to the known address only).
Advertise IntervalAdvertise interval (4–1800) for the Unsolicited
Multicast. The default is 30. The advertise interval
is a random value between the Minimum Router
Advertisement Interval (MinRtrAdvInterval) and
Maximum Router Advertisement Interval
(MaxRtrAdvInterval).
MinRtrAdvInterval = 0.33 * MaxRtrAdvInterval
RA FlagsCheck Managed to use the administered/stateful
protocol for address auto configuration.
Check Other to use the administered/stateful
protocol of other, non-address information auto
configuration.
Router PreferenceChoose low, medium, or high from the drop-down
menu. The default is medium.
The router preference provides a preference
metric for default routers. The low, medium, and
high values are signaled in unused bits in RA
messages. This extension is backward compatible,
both for routers (setting the router preference
value) and hosts (interpreting the router preference
value). These values are ignored by hosts that do
not implement router preference. This feature is
useful if there are other RADVD-enabled devices
on the LAN.
MTUMTU size (0 or 1280 to 1500). The default is 1500
bytes.
The maximum transmission unit (MTU) is the size of
the largest packet that can be sent over the
network. The MTU is used in RAs to ensure all
nodes on the network use the same MTU value
when the LAN MTU is not well-known.
Router Life TimeRouter lifetime value or the time in seconds that the
advertisement messages exists on the route. The
default is 3600 seconds.
Configuring Advertisement Prefixes
To configure the RADVD available prefixes:
STEP 1 Choose Networking > IPv6 > Advertisement Prefixes.
STEP 2 Click Add Row.
STEP 3 Enter this information:
IPv 6 Pre fix TypeChoose one of the following types:
6to4—Allows IPv6 packets to be transmitted over
an IPv4 network. It is used when an end user wants
to connect to the IPv6 Internet using their existing
IPv4 connection
Global/Local—A locally unique IPv6 address that
you can use in private IPv6 networks or a globally
unique IPv6 Internet address.
SLA IDIf you choose 6to4 as the IPv6 prefix type, enter
the Site-Level Aggregation Identifier (SLA ID).
The SLA ID in the 6to4 address prefix is set to the
interface ID of the interface on which the
advertisements are sent.
IPv6 PrefixIf you choose Global/Local as the IPv6 prefix type,
enter the IPv6 prefix. The IPv6 prefix specifies the
IPv6 network address.
IPv 6 Pre f ix LengthIf you choose Global/Local as the IPv6 prefix type,
enter the prefix length. The prefix length variable is
a decimal value that indicates the number of
contiguous, higher-order bits of the address that
make up the network portion of the address.
Prefix LifetimePrefix lifetime, or the length of time over which the
Wireless networks are convenient and easy to install. Because wireless
networking operates by sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network .
Wireless Security Tips
You cannot physically prevent someone from connecting to your wireless
network, but you can take the following steps to keep your network secure:
•Change the default wireless network name or SSID.
Wireless devices have a def a ult wireless network name or SSID. This is the
name of your wireless network, and can be up to 32 characters in length.
To protect your network, change the default wireless network name to a
unique name to distinguish your wireless network from other wireless
networks that may exist around you.
When choosing names, do not use p e rsonal information because this
information may be available for anyone to see when browsing for wireless
networks.
•Change the default password.
For wireless products such as access points, routers, and gateways, you
are asked for a password when you want to change their settings. These
devices have a default password. The default password is often cisco.
Hackers know these default values and may try to use them to access your
wireless device and change your network settings. To prevent unauthorized
access, customize the device password so that it is difficult to guess.
Cisco routers and gateways give you the ability to enable MAC address
filtering. The MAC address is a unique series of numbers and letters
assigned to every networking device.
With MAC address filtering enabled, wireless network access is provided
solely for wireless devices with specific MAC addresses. For example, you
can specify the MAC address of each computer in your network so that
only those computers can access your wireless network.
Encryption protects data transmitted over a wireless network. Wi-Fi
Protect ed Access (WP A/WP A2) and Wir ed Equivalency Privacy (WEP) offer
different levels of security for wireless communication. Currently, devices
that are Wi-Fi certified are required to support WPA2, but are not required
to support WEP.
A network encrypted with WPA/WPA2 is more secure than a network
encrypted with WEP, because WPA/WPA2 uses dynamic key encryption.
To protect the information as it passes over the airwaves, enable the highest
level of encryption supported by your network equipment.
WEP is an older encryption standard and may be the only option available
on some older devices that do not support WPA.
•Keep wireless routers, access points, or gateways away fr om exterior walls
and windows.
•Turn wireless routers, access points, or gateways off when they are not
being used (at night, during vacations).
•Use strong passphrases that are at least eight characters in length.
Combine letters and numbers to avoid using standard words that can be
found in the dictionary.
Wireless network security is useless if the underlying network is not secure. We
recommend that you take the following precautions:
•Password-protect all computers on the network and individually password-
protect sensitive files.
•Change passwords on a regular basis.
•Install anti-virus software and personal firewall software.
•Disable file sharing (peer-to-peer) to prevent applications from using file
sharing without your consent.
Wireless Networks on Your Device
4
Your device provides four virtual wireless networks, or four SSIDs (Service Set
Identifier): ciscosb1, ciscosb2, ciscosb3, and ciscosb4. These are the default
names or SSIDs of these networks, but you can change these names to more
meaningful names. This table des cribes the default settings of these networks:
SSID Nameciscosb1ciscosb2ciscosb3ciscosb4
EnabledYesNoNoNo
SSID
Broadcast
Security
Mode
MAC FilterDisabledDisabledDisabledDisabled
VLAN1111
Wireless
STEP 4 If you chose B/G/N-Mixed, N-Only, or G/N Mixed, in the Wireles s Band Selection
field, select the wireless bandwidth on your network (20MHz or 20/40MHz). If
you chose N-Only , you must use WPA2 security on your network. See Configuring
the Security Mode.
STEP 5 In the Wireless Channel field, choose the wireless channel from the drop-down
menu.
STEP 6 In the AP Management VLAN field, choose VLAN 1 if you are using the default
settings.
If you create additional VLANs, choose a value that corresponds with the VLAN
configured on other switches in the network. This is done for security purposes.
You might need to change the management VLAN to limit access to Device
Manager.
STEP 7 (Optional) In the U-APSD (WMM Power Save) field, check Enable to enable the
Unscheduled Automatic Power Save Delivery (U-APSD) feature, also r eferr ed to as
WMM Power Save, which allows the radio to conserve power.
4
U-APSD is a power-saving scheme optimized for real-time applications, such as
VoIP, transferring full-duplex data over WLAN. By classifying outgoing IP traffic as
voice data, these types of applications can increase battery life by approximately
25% and minimize transmit delays.
STEP 8 (Optional) Configure the settings of the four wireless networks (see Editing
Wireless Network Settings).
STEP 9 Click Save.
Editing Wireless Network Settings
The Wireless Table on the Basic Settings page lists the settings of the four
wireless networks supported on the device.
To configure wireless network settings:
STEP 1 Check the box for the networks that you want to configure.
STEP 2 Click Edit.
STEP 3 Configure the following settings:
Enable SSIDClick On to enable the network.
SSID NameEnt er the name of the network.
SSID BroadcastCheck this box to enable SSID broadcast. If
Security ModeSee Configuring the Security Mode.
MAC FilterSee Configuring MAC Filtering.
VLANChoose the VLAN associated with the network.
Wireless Isolation with SSIDCheck this box to enable wireless isolation
4
SSID broadcast is enabled, the wireless router
advertises its availability to wireless-equipp ed
devices in the range of the router.
within the SSID.
WMM (Wi-Fi Multimedia)Check this box to enable WMM.
Max Associated ClientsThe maximum number of clients that can
WPS Check this box to map the device WPS button
Portal ProfileSee Configuring Captive Portal.
STEP 4 Click Save.
Configuring the Security Mode
You can configure one of the following security modes for wireless networks:
Configuring WEP
The WEP security mode offers weak security with a basic encryption method that
is not as secure as WPA. WEP may be required if your network devices do not
support WPA.
connect to th e selected w ire less network. Enter
a number between 1 and 64.
on the front panel to this network.
NOTE If you do not have to use WEP, we recommend that you use WPA2. If you are using
STEP 1 Choose Wireless > Basic Settings. In the Wireless Table, check the box for the
network you want to configure.
STEP 2 Click Edit Security Mode. The Security Settings page appears.
STEP 3 In the Select SSID field, choose the SSID for which to configure the security
settings.
STEP 4 From the Security Mode menu, choose WEP.
STEP 5 In the Authentication Type field, choose one of the following options:
•Open System—This is the default option.
•Shared Key—Select this option if your network administrator recommends
4
this setting. If you are unsure, select the default option.
In both cases, the wireless client must provide the correct shared key (password)
to access the wireless network.
STEP 6 In the Encryption field, choose the encryption type:
•10/64-bit(10 hex digits)—Provides a 40-bit key.
•26/128-bit(26 hex digits)—Provides a a 104-bit key, which offers stronger
encryption, making the key more difficult to decipher. We recommend 128bit encryption.
STEP 7 (Optional) In the Passphrase field, enter an alphanumeric phrase (longer than eight
characters for optimal security) and click Generate Key to generate four unique
WEP keys in the WEP Key fields.
If you want to provide your own key, enter it directly in the Key 1 field
(recommended). The length of the key should be 5 ASCII characters (or 10
hexadecimal characters) for 64-bit WEP and 13 ASCII characters (or 26
hexadecimal characters) for 128-bit WEP. Valid hexadecimal characters are 0 to 9
and A to F.
STEP 8 In the TX Key field, choose which key to use as the shared key that devices must
use to access the wireless network.
STEP 9 Click Save to save your settings .
STEP 10 Click Back to go back to the Basic Settings pag e .
Configuring WPA-Personal, WPA2-Personal, and WPA2-Personal Mixed
The WPA Personal, WPA2 Personal, and the WPA2 Personal Mixed security
modes offer strong security to replace WEP.
•WPA-Personal—WPA is part of the wireless security standard (802.11i)
•WPA2-Personal—(Recommended) WPA2 is the implementation of the
•WPA2-Personal Mixed—Allows both WPA and WPA2 clients to connect
4
standardized by the Wi-Fi Alliance and was intended as an intermediate
measure to take the place of WEP while the 802.11i standard was being
prepared. WPA-Personal supports Temporal Key Integrity Protocol (TKIP)
and Advanced Encryption Standard (AES) encryption.
security standard specified in the final 802.11i standard. WPA2 supports
AES encryption and this option uses Preshared Key (PSK) for
authentication.
simultaneously using PSK authentication.
The personal authentication is the PSK that is an alphanumeric passphrase shared
with the wireless peer.
To configure the WPA Personal security mode:
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Edit Security Mode. The Security Settings page appears.
STEP 3 In the Select SSID field, choose the SSID for which to configure the security
settings.
STEP 4 From the Security Mode menu, choose one of the three WPA Personal options.
STEP 5 (WPA-Personal only) In the Encryption field, choose one of the following options:
•TKIP/AES—Choose TKIP/AES to ensure compatibility with older wireless
devices that may not support AES.
•AES—This option is more secure.
STEP 6 In the Security Key field, enter an alphanumeric phrase (8–63 ASCII characters or
64 hexadecimal digits). The password strength meter shows how secure the key
is: below minimum, weak, strong, very strong, or secure. We recommend using a
security key that registers on the strength meter as secure.
STEP 7 To show the security key as you are entering it, check the Unmask Password box.
STEP 8 In the Key Renewal field, enter the duration of time (600–7200 seconds) between
key renewals. The default value is 3600.
STEP 9 Click Save to save your settings . Click Back to go back to the Basic Settings
page.
Configuring WPA-Enterprise, WPA2-Enterprise, and WPA2-Enterprise Mixed
The WPA Enterprise, WPA2 Enterprise, and the WPA2 Enterprise Mixed security
modes allow you to use RADUIS server authentication.
•WPA-Enterprise—Allows you to use WPA with RADIUS server
•WPA2-Enterprise—Allows you to use WPA2 with RADIUS server
4
authentication.
authentication.
•WPA2-Enterprise Mixed—Allows both WPA and WPA2 clients to connect
simultaneously using R AD I US authentication.
To configure the WPA Enterprise security mode:
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Edit Security Mode.
STEP 3 In the Select SSID field, choose the SSID for which to configure the security
settings.
STEP 4 From the Security Mode menu, choose one of the three WPA Enterprise options.
STEP 5 (WPA-Enterprise only) In the Encryption field, choose one of the following options:
•TKIP/AES—Choose TKIP/AES to ensure compatibility with older wireless
devices that may not support AES.
•AES—This option is more secure.
STEP 6 In the RADIUS Server field, enter the IP address of the RADIUS server.
STEP 7 In the RADIUS Port field, enter the port used to access the RADIUS server.
STEP 8 In the Shared Key field, enter an alphanumeric phrase.
STEP 9 In the Key Renewal field, enter the duration of time (600–7200 seconds) between
STEP 10 Click Save to save your settings.
STEP 11 Click Back to go back to the Basic Settings pag e .
Configuring MAC Filtering
You can use MAC Filtering to permit or deny access to the wireless network based
on the MAC (hardware) address of the requesting device. For example, you can
enter the MAC addresses of a set of computers and only allow those computers to
access the network. You can configure MAC Filtering for each network or SSID.
To configure MAC filtering:
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
4
STEP 2 Click Edit MAC Filtering. The Wireless MAC Filter page appears.
STEP 3 In the Edit MAC Filtering field, check the Enable box to enable MAC Filtering for
this SSID.
STEP 4 In the Connection Control field, choose the type of access to the wireless
network:
•Prevent—Select this option to prevent devices with the MAC addresses
listed in the MAC Address T able fr om accessing the wireless network. This
option is selected by default.
•Permit—Select this option to allow devices with the MAC addresses listed
in the MAC Address Table to access the wireless network.
STEP 5 To show computers and other devices on the wireless network, click Show Client
List.
STEP 6 In the Save to MAC Address Filter List filed, check the box to add the device to
the list of devices to be added to the MAC Address Table.
STEP 7 Click Add to MAC to add the selected devices in the Client List Table to the MAC
Address Table.
STEP 8 Click Save to save your settings .
STEP 9 Click Back to go back to the Basic Settings page.
To further protect your network, you can restrict access to it by specifying when
users can access the network.
To configure Time of Day Access:
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Time of Day Access. The Time of Day Access page appears.
STEP 3 In the Active Time field, check Enable to enable Time of Day Access.
STEP 4 In the Start Time and Stop Time fields, specify the time during the day, when
access to the network is allowed.
STEP 5 Click Save.
4
Configuring Advanced Wireless Settings
Advanced wireless settings should be adjusted only by an expert administrator;
incorrect settings can reduce wireless performance.
To configure advanced wireless settings:
STEP 1 Choose Wireless > Advanced Settings. The Advanced Settings page appears.
STEP 2 Configure these settings:
Frame BurstEnable this option to provide your wireless networks
with greater performance, depending on the
manufacturer of your wireless products. If you are not
sure how to use this option, keep the default (enabled).
WMM No
Acknowledgement
Enabling WMM No Acknowledgement can result in mor e
efficient throughput, but higher error rates in a noisy
Radio Frequency (RF) environment. By default, this
setting is disabled .
Basic RateThe Basic Rate setting is not the rate of transmission but
4
a series of rates at which the Services Ready Platform
can transmit. The device advertises its basic rate to the
other wireless devices in your network, so they know
which rates will be used. The Services Ready Platform
will also advertise that it will automatically select the
best rate for transmission.
The default setting is Default, when the device can
transmit at all standard wireless rates (1 Mbps, 2 Mbps,
5.5 Mbps, 11 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48
Mbps, and 54 Mbps). In addition to B and G speeds, the
device supports N speeds. Other options are 1-2 Mbps,
for use with older wireless technology, and All, when the
device can transmit at all wireless rates.
The Basic Rate is not the actual rate of data transmission.
If you want to specify the device rate of data
transmission, configure the Transmission Rate setting.
Transmission RateThe rate of data transmission should be set depending
on the speed of your wireless network. You can select
from a range of transmission speeds, or you can select
Auto to have the device automatically use the fastest
possible data rate and enable the Auto-Fallback fe ature.
Auto-Fallback will negotiate the best possible
connection speed between the device and a wireless
client. The default is Auto.
N Transmission
Rate
The rate of data transmission should be set depending
on the speed of your Wireless-N networking. You can
select from a range of transmission speeds, or you can
select Auto to have the device automatically use the
fastest possible data rate and enable the Auto-Fallback
featur e. Auto-Fallback will negotiate the best possible
connection speed between the device and a wireless
client. The default is Auto.
Beacon IntervalThe Beacon Interval value indicates the frequency
DTIM IntervalThis value, between 1 and 255, indicates the interval of
The device automatically uses CTS (Clear-To-Send)
Protection Mode when your Wireless-N and Wireless-G
devices are experiencing severe problems and are not
able to transmit to the device in an environment with
heavy 802.11b traffic.
This function boosts the device’s ability to catch all
Wireless-N and Wireless-G transmissions but will
severely decrease performance. The default is Auto.
interval of the beacon. A beacon is a packet broadcast
by the device to synchronize the wireless network.
Enter a value between 40 and 3,500 milliseconds. The
default value is 100.
the Delivery Traffic Indication Message (DTIM). A DTIM
field is a countdown field informing clients of the next
window for listening to broadcast and multicast
messages.
Fragmentation
Threshold
When the device has buffered broadcast or multicast
messages for associated clients, it sends the next DTIM
with a DTIM Interval value. Its clients hear the beacons
and awaken to receive the broadcast and multicast
messages. The default value is 1.
This value specifies the maximum size for a packet
before data is fragmented into multiple packets. If you
experience a high packet error rate, you may slightly
increase the Fragmentation Threshold.
Setting the Fragmentation Threshold too low may result
in poor network performance. Only minor reduction of
the default value is recommended. In most cases, it
should remain at its default value of 2346.
RTS ThresholdIf you encounter inconsistent data flow, enter only minor
STEP 3 Click Save.
4
reductions. The default value of 2347 is recommended.
If a network packet is smaller than the preset Request to
Send (RTS) threshold size, the RTS/Clear to Send (CTS)
mechanism will not be enabled. The Services Ready
Platform sends RTS frames to a particular receiving
station and negotiates the sending of a data frame.
After receiving an RTS, the wireless station responds
with a CTS frame to acknowledge the right to begin
transmission.
Detecting Rogue Access Points
A rogue access point is an access point (AP) that has been installed on a secure
network without authorization from a system administrator. Rogue APs pose a
security threat because anyone with access to the premises can install a wireless
AP that can allow unauthorized parties to access the network.
Use the Rogue AP Detection page to enable your device to display information
about all APs detected by the device in the vicinity of the network. If the access
point listed as a rogue is actually a legitimate access point, you can add it to the
Authorized AP Table. Select a refresh rate to ensure that the Rogue AP Detection
page always displays the latest information.
To enable Rogue AP detection:
STEP 1 Choose Wireless > Rogue AP.
STEP 2 Click the Rogue AP Detection On radio button.
STEP 3 Click Save.
STEP 1 In Rogue AP Detected Table, check the box for the access point that you want to
authorize.
STEP 2 Click Authorize.
To add an access point to the Authorized AP table:
STEP 1 Click Add Row.
STEP 2 Enter the MAC address of the access point that you want to authorize.
STEP 3 Enter the SSID or the name that identifies the wireless network.
STEP 4 Choose the security mode associated with the ac cess point.
Protocol) as the encryption algorithm associated with the access point.
STEP 6 Choose RADIUS server or PSK (Pre-Shared Key) to authenticate th e access point.
STEP 7 Select the wireless network mode that the access point uses.
STEP 8 Choose the radio frequency that the access point uses.
STEP 9 Click Save.
Importing Authorized AP Lists
You can import a list of authorized access points using a CSV file. Use the
following values as a reference when you create the CSV file.
Ensure that the content in the CSV file is arranged as shown in the following
example:
4
•4 — CCMP
•1 — RADIUS
BSSIDSecurityEncryptionAuthenticationWireless
Network
00:1C:10:CE:44:4842231Auth_Guest
To import a list of authorized APs:
STEP 1 Click Merge to add the list of access points that you want to import, to the access
points displayed in Authorized AP Table. Click Replace to replace the APs in the
table with the APs in the list that you want to import.
STEP 2 Click Browse to locate the file that you want to import.
STEP 3 Click Save.
ChannelSSID
Configuring WDS
A Wireless Distribution System (WDS) is a system that enables the wireless
interconnection of access points in a network. It allows a wireless network to be
expanded using multiple access points without the need for a wired backbone to
link them.
To establish a WDS link, the device and other remote WDS peers must be
configured in the same wireless network mode, wireless channel, wireless b and
selection, and encryption t y pes (None or WEP).
You can configure WDS in Bridge mode where one AP acts as the common link
between multiple APs or in Repeater mode where one AP connects two APs
without a wired connection to the LAN, by repeating signals using the wireless
connection.
WDS is suppor ted on one SSID only.
To configure WDS in Bridge mode:
STEP 1 Choose Wireless > WDS.
STEP 2 To enable WDS, check the Enable.
STEP 3 Select the WDS Bridge radio button.
STEP 4 In the Remote Wireless Bridge’s MAC Address section, enter the MAC addresses
of up to four access points to use as bridges in the MAC 1, MAC 2, MAC 3,and
MAC 4 fields.
4
STEP 5 Click Save.
To configure WDS in Repeater mode:
STEP 1 Choose Wireless > WDS.
STEP 2 Check the WDS check box .
STEP 3 Choose the repeater mode. If you select Allow wireless signal to be repeated by
a repeater, enter the MAC addresses of up to three access points to use as repeaters in the MAC 1, MAC 2, and MAC 3 fields.
STEP 4 If you select Repeat wireless signal of a remote access point:
•Enter the MAC address of a wireless access point in the MAC field.
•Click Show Available Networks to display the Available Networks Table.
Click Connect to add the MAC address of the selected access point to the
MAC field.
Configure WPS to allow WPS-enabled devices to easily and securely connect to
the wireless network . Refer to your client device documentation for additional
instructions on setting up WPS on your client device.
To configure WPS:
STEP 1 Choose Wireless > WPS. The Wi-Fi Protected Setup page appears
STEP 2 Select the SSID option from the drop-down menuCisco RV130W
STEP 3 Configure the WPS on client devices in one of the following three ways:
•Click or press the WPS button on the client device and click the WPS icon on
4
this page.
•Enter the WPS PIN number of the client and click Register.
•A client device requires a PIN number from this router, use the router PIN
number indicated.
-Device PIN Status—WPA device personal identification number (PIN)
status.
-Device PIN—Identifies the PIN of a device trying to connect.
-PIN Lifetime—The lifetime of the key. If the time expires, a new key is
negotiated.
After you configure WPS, the following information appears at the bottom of the
WPS page: Wi-Fi Protected Setup Status, Network Name (SSID), and Security.
Configuring Captive Portal
Use the Captive Portal feature to provide controlled, authenticated access to the
Internet and your network resources, without compromising security. A captive
portal displays a special web page to authenticate clients before they can use the
Internet. You can configure Captive Portal verification to allow access for both
guest and authenticated network users.
Configure Captive Portal instances for each virtual wireless network on your
device by associat ing it with a portal profile.
STEP 1 Choose Wireless > Captive Portal > Portal Profile. In the Portal Profile Table
section, click Add Row. To modify the portal profile provided on the device, check
the Default_Portal_Profile box and click Edit.
STEP 2 Enter a name for your Captive Portal profile.
STEP 3 Choose if you want to use the profile to authenticate guest users or users on your
network.
STEP 4 To redirect users to a URL after authentication, enable Auto Redirect URL, and
enter a fully qualified domain name or IP address in the Redirect URL field. For
example, include http:// in the URL.
STEP 5 In the Session Timeout field, specify the number of minutes that the device will
keep an authentication session open with the associated wireless client. The
default timeout is 60 minutes.
4
STEP 6 Select a font color for the text that you want to display on the page.
STEP 7 Specify the text that you want to display, such as the name of your organization,
the label text for username and password fields, and the label on the Login button.
STEP 8 Enter standard Copyright text associated with your company.
STEP 9 In the Error 1 and Error 2 fields, enter the error messages that you want to display
to clients when login fails and when the maximum number of connections is
exceeded.
STEP 10 To use a check box to allow users to accept terms of use before they continue,
enable Agreement. The text in the Agreement Text field will be displayed as the
label for the checkbox.
STEP 11 Enter the acceptance terms t hat you want to d isplay to users in the Acceptance
Use Policy field.
STEP 12 In the Upload Files section, choose files to upload your company logo and
background files in keeping with your company’s branding guidelines. S ave your
profile.
To preview this profile, choose Captive Portal > Portal Page Preview, and select
the profile from the Portal Profile drop-down list.
To configure a captive portal instance for your device:
STEP 1 Choose Wireless > Basic Setti ngs.
STEP 2 In the Wirel es s Table section, check the Enable box for the SSID for which you
want to configure a captive portal. Click Edit.
STEP 3 Select a portal profile for the SSID.
You can create up to f our captive portals using the SSIDs for your device. To create
a new portal profile, select Create a new Portal Profile from the drop-down list.
Choose Default_Portal_Profile to use the portal profile provided on your device.
STEP 4 Check the Enable box to enable the captive portal for the SSID.
STEP 5 Save your captive portal instances.
4
Creating Captive Portal User Accounts
To create a captive portal user account :
STEP 1 Choose Wireless > Captive Portal > User Accounts.
STEP 2 Click Add Row.
STEP 3 Enter a username and password. Reenter the password to verify it.
We recommended that the pas s word contains no dictionary words from any
language, and is a mix of letters (both uppercase and lowercase), numbers, and
symbols. The password can be up to 64 characters long.
STEP 4 In the Access Time (Minutes) field, specify the duration after which the
authentication session will timeout.
STEP 5 To import usernames and passwords from a CSV file, click Import. The
Administration > Users page is displayed. In the Import Username and Password
section, click Browse to locate th e file, and click Import. See Importing User
You can secure your network by creating and applying rules that the device uses
to selectively block and allow inbound and outbound Internet traffic. You then
specify how and to what devices the rules apply. To do so, you must define the
following:
5
•Services or traffic types that the router should allow or block. For example,
web browsing, VoIP, other standard services and custom services that you
define.
•Direction for the traffic by specifying the source and destination of traffic;
this is done by specifying the From Zone (LAN/WAN/DMZ) and To Zone
(LAN/WAN/DMZ).
•Schedules as to when the router should apply rules.
•Keywords (in a domain name or on a URL of a web page) that the router
should allow or block.
•Rules for allowing or blocking inbound and outbound Internet traffic for
specified services on specified schedules.
•MAC addresses of devices whose inbound access to your network the
router should block.
•Port triggers that signal the router to allow or block access to specified
services as defined by port number.
•Reports and alerts that you want the router to send to you.
You can, for example, establish restricted-access policies based on time-of-day,
web addresses, and web address keywords. You can block Internet access by
applications and services on the LAN, such as chat rooms or games. You can block
specific groups of PCs on your network from being accessed by the WAN or
public DMZ network.
Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN side is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called “exposing your host.” How you make
your address known depends on how the WAN ports are configured; for the
device, you may use the IP address if a static address is assigned to the W AN port,
or if your WAN addres s is dynamic, a DDNS (Dynamic DNS) name can be used.
Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network,
selectively allowing only specific local users to access specific outside resources.
The default outbound rule is to allow access from the secure zone (LAN) to either
the public DMZ or insecure WAN. To block hosts on the secure LAN from
accessing services on the outside (insecure WAN), you must create a firewall rule
for each service.
5
Configuring Basic Firewall Settings
To configure basic firewall settings:
STEP 1 Choose Firewall > Basic Settings.
STEP 2 Configure the following firewall settings:
IP Address Spoofing
Protection
DoS ProtectionCheck Enable to enable Denial of Service
Block WAN RequestBlocks ping requests to the device from the WAN.
LAN/VPN Web AccessChoose the type of web access that can be used
To protect your network against IP address
spoofing, check the Enable check box.
protection.
to connect to the firewall: HTTP or HTTPS (secure
HTTP).
Remote Management
Remote Access
Remote Upgrade
Allowed Remote IP
Address
Remote Management
Port
IPv4 Multicast
Passthrough (IGMP
Proxy)
IPv 6 Multicast
Passthrough (IGMP
Proxy)
SIP ALGTo allow Se ssion Initiation Protocol (SIP) traffic to
UPnP
Allow Users to Configure
Allow Users to Disable
Internet Access
See Configuring Remote Management.
Check Enable to enable multicast passthrough for
IPv4.
Check Enable to enable multicast passthrough for
IPv6.
traverse the firewall, check the SIP A LG check box.
The device supports a maximum of 256 sessions.
See Configuring Universal Plug and Play.
Block JavaCheck to block Java applets. Java applets are
small programs embedded in web pages that
enable dynamic functionality of the page. A
malicious applet can be used to compromise or
infect computers.
Enabling this setting blocks Java applets from
being downloaded. Click Auto to automaticall y
block Java, or click Manual and enter a specific
port on which to block Java.
Block CookiesCheck to block cookies. Cookies are used to store
Block ActiveXCheck to block ActiveX content. Similar to Java
5
session information by websites that usually
require login. However, several websites use
cookies to store tracking information and browsing
habits. Enabling this option filters out cookies from
being created by a website.
Many websites require that cookies be accepted in
order for the site to be accessed properly . Blocking
cookies can cause many websites to not function
properly.
Click Auto to automatically bl ock coo kies, or click
Manual and enter a specific port on which to block
cookies.
applets, ActiveX controls are installed on a
Windows computer while running Internet Explorer.
A malicious ActiveX control can be used to
compromise or infect computers.
Enabling this setting blocks ActiveX applets from
being downloaded.
Click Auto to automatically block ActiveX, or click Manual and enter a specific port on which to block
ActiveX.
Block ProxyCheck to block proxy servers. A proxy server (or
proxy) allows computers to route connections to
other computers through the proxy, thus
circumventing certain firewall rules.
For example, if connections to a specific IP address
are blocked by a firewall rule, the requests can be
routed through a proxy that is not blocked by the
rule, rendering the restriction ineffective. Enabling
this feature blocks proxy servers.
Click Auto to automatically block proxy s ervers, or
click Manual and enter a specific port on which to
block proxy servers.
You can enable remote management so that you can access the device from a
remote WAN network.
To configure remote management, configure these settings on the Bas ic Setti ngs
page:
Remote ManagementCheck Enable to enable remote management.
Remote AccessChoose the type of web access that can be used
5
to connect to the firewall: HTTP or HTTPS (secure
HTTP).
Remote UpgradeTo allow remote upgrades of the device, check
Enable.
Allowed Remote IP
Address
Remote Management
Port
CAUTION When remote management is enabled, the router is accessible to anyone who
knows its IP address. Because a malicious WAN user can reconfigure the device
and misuse it, it is highly recommended that you change the administrator and an y
guest passwords before continuing.
Click the Any IP Address button to allow remote
management from any IP address, or enter a
specific IP address in the address field.
Enter the port on which remote access is allowed.
The default port is 443. When remotely accessing
the router, you must enter the remote management
port as part of the IP address. For example:
Universal Plug and Play (UPnP) allows automatic discovery of devices that can
communicate with the device.
To configure UPnP, configure these settings on the Basic Settings page:
UPnPCheck Enable to enable UPnP.
Allow Users to ConfigureCheck this box to allow UPnP port-mapping rules
to be set by users who have UPnP support enabled
on their computers or other UPnP-enabled devices.
If disabled, the device does not allow the
application to add the forwarding rule.
Allow Users to Disable
Internet Access
Managing Firewall Schedules
You can create firewall schedules to apply firewall rules on specific days or at
specific times of the day.
Adding or Editing a Firewall Schedule
To create or edit a schedule:
STEP 1 Choose Firewall > Schedule Management.
STEP 2 Click Add Row.
STEP 3 In the Name field, enter a unique name to identify the schedule. This name is
available on the Fir ewall Rule Configuration page in the Select Schedule list. (See
Configuring Access Rules.)
Check this box to allow users to disable Internet
access.
STEP 4 In the Scheduled Days section, choose if you want to apply the schedule to All
days or Specific Days. If you choose Specific Days, check the box next to the
days that you want to include in the schedule.
STEP 5 In the Scheduled Time of Day section, choose the time when you want the
schedule to apply. If you choose Specific Time, enter the start and end times.
When you create a firewall rule, you can specify a service that is controlled by the
rule. Common types of services are available for selection, and you can create
your own custom services.
The Services Management page allows you to create custom services against
which firewall rules can be defined. Once defined, the new service appears in the
List of Available Custom Services table.
The Access Rules page allows you to configure the default outbound policy for
the traffic that is directed from the secure network (LAN) to the non-secure
network (dedicated WAN/optional).
The default inbound policy for traffic flowing from the non-secure zone to the
secure zone is always blocked and cannot be changed.
NOTE Internet access policies override access rules, when both are configured on the
Note: Ensure that IPv6 support is enabled on the device to configure an IPv6
firewall. See Configuring IPv6.
STEP 3 Click Save.
Reordering Access Rules
The order in which access rules are displayed in the access rules table indicates
the order in which the rules are applied. You may want to reorder the table t o have
certain rules applied before other rules. For e xample, you ma y want to apply a rule
allowing certain t y pes of traffic before blocking other types of traffic.
To reorder access rules:
STEP 1 Choose Firewall > Access Rules.
STEP 2 Click Reorder.
STEP 3 Check the box in the row of the rule that you want to move up or down and click
the up or down arrow to move the rule up or down one line, or select the desired
position of the rule in the drop-down list and click Move to.
STEP 1 Choose Firewall > Access Rules.
STEP 2 Click Add Row.
STEP 3 In the Connection Type field, choose the source of originating traffic:
5
Adding Access Rules
All configured firewall rules on the device are displayed in the Access Rules
Table. This list also indicates whether the rule is enabled (active) and gives a
summary of the From/To zone as well as the services and users the rule affects.
To create an access rule:
•Outbound (LAN > WAN)—Choose this option to create an outbound rule.
•Inbound (WAN > LAN)—Choose this option to create an inbound rule.
•Inbound (WAN > DMZ)—Choose this option to create an inbound rule.
STEP 4 From the Action drop-down menu, choose the action:
•Always Block—Always block the selected type of traffic.
•Always Allow—Never block the selected type of traffic.
•Block by schedule—Blocks the selected type of traffic according to a
schedule.
•Allow by schedule—Allows the selected type of traffic according to a
schedule.
STEP 5 From the Services drop-down menu, choose the service to allow or block for this
rule. Choose All Traffic to allow the rule to apply to all applications and services,
or choose a single application to block:
•Terminal Access Controller Access-Control System (TACACS)
•Telnet (command)
•Telnet Secondar y
•Telnet SSL
•Voice (SIP)
STEP 6 In the Source IP field, select the users to which the firewall rule applies:
•Any—The rule applies to traffic originating on any host in the local network.
•Single Address—The rule applies to traffic originating on a single IP address
in the local network. Enter the address in the Start field.
•Address Range—The rule applies to traffic originating from an IP address
located in a range of addresses. Enter the starting IP address in the Start
field, and the ending IP address in the Finish field.
STEP 7 In the Log field, specify whether the packets for this rule should be logged.
To log details for all packets that match this rule, choose Always from the dropdown menu. For example, if an outbound rule for a schedule is selected as Block Always, for every packet that tries to make an outbound connection for that
service, a message with the packet's source address and destination address
(and other information) is recorded in the log.
Enabling logging may generate a significant volume of log messages and is
recommended for debugging purposes only.
Choose Never to disable logging.
Note: When traffic is going from the LAN or DMZ to the WAN, the system requires
rewriting the source or destination IP address of incoming IP packets as they pass
through the firewall.
STEP 8 Check the Rule Status Enable check box, to enable the new access rule.
The device supports several options for blocking Internet access. You can block
all Internet traffic, block Internet traffic to certain PCs or endpoints, or block
access to Internet sites by specifying keywords to block. If these keywords are
found in the site's name (for example, web site URL or newsgroup name), the site is
blocked.
Adding or Editing an Internet Access Policy
5
To create a Internet access policy:
STEP 1 Choose Firewall > Internet Access Policy.
STEP 2 Click Add Row.
STEP 3 Check the Status Enable check box.
STEP 4 Enter a policy name for identification and management purposes.
STEP 5 From the Action drop-down menu, choose the type of access restriction you need:
•Always block—Always block Internet traffic. This blocks Internet traffic to
and from all endpoints. If you want to block all traffic but allow certain
endpoints to receive Internet traffic, see Step 7.
•Always allow—Always allow Internet traffic. You can refine this to block
specified endpoints from Internet traffic; see Step 7. You can also allow all
Internet traffic except for certain websites; see Step 8.
•Block by schedule—Blocks Internet traffic according to a schedule (for
example, if you wanted t o block Internet traffic during the weekda y business
hours, but allow it after hours and on weekends).
•Allow by schedule—Allows Internet traffic according to a schedule.
If you chose Block by schedule or Allow by schedule, click Config u re Sc hed ul es
to create a schedule. See Managing Firewall Schedules.
STEP 7 (Optional) Apply the access policy to specific PCs to allow or block traffic coming
from specific devices:
a. In the Apply Access Policy to the Following PCs table, click Add Row.
b. From the Type drop-down menu, choose how to identify the PC (by MAC
address, by IP address, or by providing a range of IP addresses).
c. In the Value field, depending on what you chose in the previous step, enter the
one of the following:
•MAC address (xx:xx:xx:xx:xx:xx) of the PC to which the policy applies.
•The IP address of the PC to which the policy applies.
•The starting and ending IP addresses of the range of addresses to block (for
STEP 8 To block traffic from specific websites:
5
example, 192.168.1.2-192.168.1.253).
a. In the Website Domain Name & Keyword table, click Add Row.
b. From the Type drop-down menu, choose how to block a website (by
specifying the domain name or by specifying a keyword that appears in the
URL).
c. In the Value field, enter the URL or keyword used to block the website.
For example, t o block the example.com URL, choose URL Address from the
drop-down menu and enter example.com in the Value field. To block a URL
that has the keyword “example” in the URL, choose Keyword from the dropdown menu and enter example in the Value field.
Use the One-to-one NAT page to map local IP addresses behind your firewall to
global IP addresses. One-to-one NAT is a way to make systems configured with
private IP addresses, which are behind a firewall, appear to have public IP
addresses.
To add a One-to-One NAT rule:
STEP 1 Choose Firewall > One-to-One NAT.
STEP 2 Click Add Row.
STEP 3 In the Private Range Begin field, enter the starting IP address in the private (LAN) IP
address range.
STEP 4 In the Public Range Begin field, enter the starting IP address in the public (WAN) IP
address range.
STEP 5 In the Range Length, enter the number of public IP addresses that should be
mapped to private addresses.
STEP 6 In the Service field, choose the service for which the rule applies. Services for
one-to-one NAT allow you to configure the service to be accepted by the private
IP (LAN) address when traffic is sent to the corresponding public IP address.
Configured services on private IP addresses in the range are accepted when
traffic is available on the corresponding public IP address.
STEP 7 Click Save.
Configuring Port Forwarding
Port forwarding is used to redirect traffic from the Internet from one port on the
W AN t o another port on the LAN. Common services are available or you can define
a custom service and associated ports to forward.
The Single Port Forwarding Rules and Port Range Forwarding Rules pages list
all the available port forwarding rules for this device and allow you to configure
port forwarding rules .
NOTE Port forwarding is not appropriate for servers on the LAN because there is a
5
dependency on the LAN device making an outgoing connection before incoming
ports are opened.
Some applications require that, when external devices connect to them, they
receive data on a specific port or range of ports in order to function properly. The
router must send all incoming data f o r that application only on the required port or
range of ports.
The gateway has a list of common applications and games with corresponding
outbound and inbound ports to open. You can also specify a port forwarding rule
by defining the type of traffic (TCP or UDP) and the range of incoming and
outgoing ports to open when enabled.
Configuring Single Port Forwarding
To add a single po rt forwarding rule:
STEP 1 Choose Firewall > SinglePort Forwarding. A preexisting list of applications is
displayed.
STEP 2 In the Application field, enter the name of the application for which to configure
port forwarding.
STEP 3 In the External Port field, enter the port number that triggers this rule when a
connection request from outgoing traffic is made.
STEP 4 In the Internal Port field, enter the port number used by the remote system to
respond to the request it receives.
STEP 5 In the Interface drop-down menu, choose Both (Ethernet & 3G), Ethernet, or 3G.
STEP 6 From the Protocol drop-down menu, choose a protocol (TCP, UDP, or TCP &
UDP).
STEP 7 In the IP Address field, enter the IP address of the host on the LAN side to which
the specific IP traffic will be forwarded. For example, you can forward HTTP traffic
to port 80 of the IP address of a web server on the LAN side.
STEP 8 In the Enable field, check the Enable box to enable the rule.
STEP 9 Click Save.
STEP 1 Choose Firewall > Po rt Range Forwarding.
STEP 2 In the Application field, enter the name of the application for which to configure
STEP 3 In the External Port field, specify the port number that will trigger this rule when a
STEP 4 In the Start field, spe cify the port number that begins the range of ports to
STEP 5 In the End field, specify the port number that ends the range of ports to forward.
STEP 6 In the Interface drop-down menu, choose Both (Ethernet & 3G), Ethernet, or 3G.
5
Configuring Port Range Forwarding
To add a po rt range forwarding rule:
port forwarding.
connection request from outgoing traffic is made.
forward.
STEP 7 From the Protocol drop-down menu, choose a protocol (TCP, UDP, or TCP &
UDP).
STEP 8 In the IP Address field, enter the IP address of the host on the LAN side to which
the specific IP traffic will be forwarded.
STEP 9 In the Enable field, check the Enable box to enable the rule.
STEP 10 Click Save.
Configuring Port Range Triggering
Port triggering allows devices on the LAN or DMZ to request one or more ports to
be forwarded to them. Port triggering waits for an outbound request from the LAN/
DMZ on one of the defined outgoing ports, and then opens an incoming port for
that specified type of traffic.
Port triggering is a form of dynamic port forwarding while an application is
transmitting data over the opened outgoing or incoming ports. Port triggering
opens an incoming port for a specific type of traffic on a defined outgoing port.
Port triggering is more flexible than static port forwarding (available when
configuring firewall rules) because a rule does not have to reference a specific
LAN IP or IP range. Ports are also not left open when not in use, which provides a
level of security that port forwarding does not offer.
NOTE Port triggering is not appropriate for servers on the LAN, since there is a
STEP 1 Choose Firewall > Port Range Triggering.
STEP 2 In the Application field, enter the name of the application for which to configure
5
dependency on the LAN device making an outgoing connection before incoming
ports are opened.
Some applications require that, when external devices connect to them, they
receive data on a specific port or range of ports in order to function properly. The
router must send all incoming data f o r that application only on the required port or
range of ports. The gateway has a list of common applications and games with
corresponding outbound and inbound ports to open. Yo u can also specify a port
triggering rule by defining the type of traffic (TCP or UDP) and the range of
incoming and outgoing ports to open when enabled.
To add a port triggering rule:
port forwarding.
STEP 3 In the Triggered Range fields, enter the port number or range of port numbers that
will trigger this rule when a connection request from outgoing traffic is made. If the
outgoing connection uses only one port, enter the same port number in both
fields.
STEP 4 In the Forwarded Range fields, enter the port number or range of port numbers
used by the remote system to respond to the request it receives. If the incoming
connection uses only one port, then specify the same port number in both fields.
STEP 5 In the Interface drop-down menu, choose Both (Ethernet & 3G), Ethernet, or 3G.
STEP 6 In the Enable field, check the Enable box to enable the rule.
STEP 7 Click Save.
You can configure VPN on your device to provide you a secure communication
channel or a tunnel between:
•Two gateway routers
6
•A remote client device and a gateway router
Configuring Basic Site-to-Site IPsec VPN
Your device supports site-to-site IPsec VPN for a single gateway-to-gateway VPN
tunnel. After configuring these basic VPN set tings, you can connect securely to
another VPN-enabled router. For example, you can configure your device at a
branch site to connect to a router that connects site-to-site VPN tunnels at the
corporate site, so that the branch site has secur e access to the corporate network.
To configure basic VPN se ttings for a site-to-site IPsec connection:
STEP 1 Choose VPN > Site-to-Site IPsec VPN > Basic VPN Setup.
STEP 2 In the New Connection Name field, enter a name for the VPN tunnel.
STEP 3 In the Pre-Shared Key field, enter the pre-shared key, or password, that will be
exchanged between the two routers. It must be between 8 and 49 characters.
STEP 4 In the Endpoint Information fields, enter the following information:
•Remote Endpoint—Choose if the router to which your device will connect
will be identified by its IP address or by a fully qualified domain name. For
example, an IP address such as 192.168.1.1 or a fully qualified domain name
such as cisco.com.
•Remote WAN (Internet) IP Address—Enter the public IP address or domain
name of the remote endpoint.
•Local WAN (Internet) IP Address—Enter the public IP address or domain
name of your device.
STEP 5 In the Secure Connection Remote Accessibility fields, enter the following
information:
•Remote LAN (Local Network) IP Address—The private network (LAN)
address of the remote endpoint. This is the IP address of the internal network
at the remote site.
•Remote LAN Subnet Mask—The private network (LAN) subnet mask of the
remote endpoint.
•Local LAN (Local Network) IP Address—The private netw ork (LAN)
address of the local network. This is the IP address of the internal network
on the device.
6
•Local LAN (Local Network) Subnet Mask—The private network (LAN)
subnet mask of the local network.
Note: The remote WAN and remote LAN IP addresses cannot exist on the same
subnet. For example, a remote LAN IP address of 192.168.1.100 and a local LAN IP
address of 192.168.1.115 causes a conflict when traffic is routed over the VPN.
The third octet must be different so that the IP addresses are on differ ent subnets.
For example, a remote LAN IP address of 192.168.1.100 and a local LAN IP
address of 192.168.2.100 is acceptable.
STEP 6 Click Save.
Viewing Default Values
Click View Default Settings to view the default values used in the basic VPN
settings. These values are proposed by the VPN consortiu m and assume that you
are using a pre-shared k ey, or password that is known to both your device and the
remote endpoint.