THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL
ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED
WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL
RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT
ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND
ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE
FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE
OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE
ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and
other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses
or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current
online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at
www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/
legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use
of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
RV340x Administration Guide
iii
Introduction
Introduction
Introduction
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL
ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED
WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL
RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT
ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND
ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE
FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and
found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits
are designed to provide reasonable protection against harmful interference when the equipment is operated
in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and,
if not installed and used in accordance with the instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful interference, in
which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: This equipment has been tested and
found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC rules. These limits
are designed to provide reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If the equipment causes interference to radio or
television reception, which can be determined by turning the equipment off and on, users are encouraged to
try to correct the interference by using one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority
to operate the product.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE
OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE
ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
RV340x Administration Guide
iv
Introduction
Introduction
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and
other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses
or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current
online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at
www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/
legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use
of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
RV340x Administration Guide
v
Contents
CONTENTS
Full Cisco Trademarks with Software Licenseiii
Introductioniv
CHAPTER 1
CHAPTER 2
Getting Started1
Setting Up Your Device 1
Getting Started 3
Troubleshooting Tips 4
User Interface 4
Status and Statistics7
System Summary 7
TCP/IP Services 9
Port Traffic 10
WAN QoS Statistics 11
ARP Table 11
Routing Table 12
DHCP Bindings 12
Mobile Network 13
View Logs 13
CHAPTER 3
vi
Captive Portal Status 14
Administration17
File Management 17
RV340x Administration Guide
Manual Upgrade 18
Auto Update 18
Reboot 20
Diagnostic 20
Certificate 21
Import Certificate 21
Generate CSR/Certificate 21
Built-In 3rd-Party CA Certificates 22
Select as Primary Certificate 22
Configuration Management 22
Contents
CHAPTER 4
System Configuration25
System 25
Time 26
Log 26
Email Server 27
Remote Syslog Server 28
Email 28
User Accounts 29
Remote Authentication Service 31
User Groups 32
IP Address Groups 33
SNMP 34
Discovery-Bonjour 35
LLDP 35
Automatic Updates 36
Schedules 37
CHAPTER 5
Service Management 37
PnP (Plug and Play) 38
Plug and Play Connect Service 38
Creating a Controller Profile 38
Registering Devices 39
WAN41
RV340x Administration Guide
vii
Contents
WAN Settings 41
Multi-WAN 44
Mobile Network 46
Mobile Network Setup 46
Bandwidth Cap Setting 47
Dynamic DNS 47
Hardware DMZ 48
IPv6 Transition 48
IPv6 in IPv4 Tunnel (6in4) 49
IPv6 Rapid Deployment (6rd) 49
CHAPTER 6
CHAPTER 7
LAN51
Port Settings 51
PoE Settings (RV345P) 52
VLAN Settings 53
LAN/DHCP Settings 55
Static DHCP 58
802.1X Configuration 58
DNS Local Database 59
Router Advertisement 59
Wireless (RV340W) 61
Basic Settings 61
Configuring 2.4 GHz Radio 63
Configuring 5 GHz Radio 64
Advanced Settings 64
Captive Portal 66
CHAPTER 8
viii
WPS 67
Routing 69
IGMP Proxy 69
RIP 70
Static Routing 71
RV340x Administration Guide
Contents
CHAPTER 9
CHAPTER 10
Firewall 73
Basic Settings 73
Access Rules 74
Network Address Translation 76
Static NAT 76
Port Forwarding 77
Port Triggering 78
Session Timeout 78
DMZ Host 79
VPN 81
VPN Status 81
IPSec Profiles 83
Site-to-Site 86
Client to Site 89
Teleworker VPN Client 92
CHAPTER 11
PPTP Server 93
L2TP Server 94
GRE Tunnel 95
SSL VPN 95
VPN Passthrough 98
Security 99
Application Control 99
Settings 99
Application Statistics 100
Client Statistics 101
Web Filtering 101
Content Filtering 102
IP Source Guard 103
Cisco Umbrella 103
Threat and IPS 104
Status 104
RV340x Administration Guide
ix
Contents
Antivirus 105
IPS 106
CHAPTER 12
CHAPTER 13
CHAPTER 14
QoS 109
Traffic Classes 109
WAN Queuing 110
WAN Policing 111
WAN Bandwidth Management 111
Switch Classification 111
Switch Queuing 112
Configuration Wizards 115
Initial Setup Wizard 115
Application Control Wizard 116
VPN Setup Wizard 116
License 119
License 119
Request a Smart Account 120
CHAPTER 15
Smart Software Licensing Status 121
Smart License Usage 121
Where To Go From Here123
Where To Go From Here 123
RV340x Administration Guide
x
CHAPTER 1
Getting Started
Thank you for choosing the Cisco RV34xx. This guide describes how to install and manage your device. Your
Cisco RV34xx comes with default settings. However, your internet service provider (ISP) might require you
to modify the settings. You can modify the settings using a web browser such as Internet Explorer (version
10 and higher), Firefox, or Chrome (for PC) or Safari (for Mac).
This section contains the following topics:
• Setting Up Your Device, on page 1
• User Interface, on page 4
Setting Up Your Device
This section will help get you started with your device by following these steps:
Step 1Connect a PC to a numbered LAN port on the device. If the PC is configured to become a DHCP client, an IP address in
the 192.168.1.x range is assigned to the PC.
Step 2Start a web browser.
Step 3In the address bar, enter the default IP address of the device, 192.168.1.1. The browser might issue a warning that the
website is untrusted. Continue to the website.
Step 4When the sign-in page appears, enter the default username cisco and the default password cisco (lowercase).
Step 5Click Login.
Note
During the system boot up, the power LED will progressively keep flashing until the system has fully booted.
At start up, the PWR, LINK/ACT and GIGIBIT LEDs of LAN 1 will flash. At 25% boot up, the PWR,
LINK/ACT and GIGIBIT LEDs of LAN 1 and 2 will flash. At 50% boot up, the PWR, LINK/ACT and GIGIBIT
LEDs of LAN 1, 2 and 3 will flash. At 75% boot up, the PWR, LINK/ACT and GIGIBIT LEDs of LAN 1, 2,
3 and 4 will flash.
The system boot time will be less than 3 minutes typically. If the device is fully configured with all feature
configuration settings set to a maximum, it may take up to 7 minutes to fully boot the system.
RV340x Administration Guide
1
Setting Up Your Device
Table 1: Description of the LEDs
Getting Started
PWR
DIAG
LINK/ACT of WAN1,
WAN2 and LAN 1-4
GIGABIT of WAN1,
WAN2 and LAN 1-4
DMZ
VPN
Off when the device is powered off.
Solid green when the device is powered on and booted.
Flashing green when the device is booting up.
Off when the system is on track to bootup.
Slow blinking red (1Hz) when the firmware upgrade is in progress.
Fast blinking red (3Hz) when the firmware upgrade is failing.
Solid red when the system failed to boot-up with both active and inactive images or in
rescue mode.
Off when there is no Ethernet connection.
Solid green when the GE Ethernet link is on.
Flashing green when the GE is sending or receiving data.
Solid green when at 1000M speed.
Off when at non-1000M speed.
Solid green when the DMZ is enabled.
Off when the DMZ is disabled.
Off when no VPN tunnel is defined, or all defined VPN tunnels have been disabled.
USB1 and USB2
RESET
Wireless
Solid green when at least one VPN tunnel is up.
Flashing green when sending or receiving data over VPN tunnel.
Solid amber when no enabled VPN tunnel is up.
Off when no USB device is connected, or is inserted but not recognized.
Solid green when the USB dongle is connected to the ISP successfully. USB storage is
recognized.
Flashing green when sending or receiving data.
Solid amber when the USB dongle is recognized but fails to connect to ISP (no IP address
is assigned). The USB storage access has errors.
To reboot the device, press the reset button with a paper clip or pen tip for less than 10
seconds.
To reset the device to factory default settings, press and hold the reset button for 10
seconds.
LED is on when the internal access point is enabled.
LED is off when the internal access point is disabled.
RV340x Administration Guide
2
Getting Started
Getting Started
Before going over to setup wizard, a password change window will appear if we are logging in to the router
for the first time after Factory reset. The screen will show up with user accounts link. Here it will ask for the
following :
1. Old password
2. New password
3. Confirm new password (Password Strength Meter)
4. Click Save.
Now we you can use the various links available on this page and follow the on-screen instructions to quickly
configure your network device. You can use the various links available on this page and follow the on-screen
instructions to quickly configure your network device.
Launch Setup Wizard
Getting Started
Directs you to the Initial Setup Wizard.Initial Setup Wizard
Wizard
Initial Configuration
Change Administrator
Password
Configure WAN Settings
Configure USB Settings
ConfigureVLANSettings
Quick Access
Upgrade Firmware
Configure Remote
Management Access
Backup Device
Configuration
Directs you to the VPN Status Wizard.VPN Setup Wizard
Directs you to the Application Control Wizard.Application Control
Directs you to the User Accounts page where you can change the administrator
password and set up a guest account.
Directs you to the WAN Settings page where you can modify the WAN
parameters such as IPv4 or IPv6 address and status.
Directs you to the Mobile Network page where you can modify the USB
configurations.
Directs you to the VLAN Membership Settings page where you can configure
the VLAN.
Directs you to the File Management page where you can update the device
firmware.
Directs you to the FireWall >Basic Settings page where you can enable the
basic features of the device.
Directs you to the Config Managementpage where you can manage the device’s
configuration.
Device Status
System Summary
Directs you to the System Summary page that displays the IPv4 and IPv6
configuration, Port, Radio and VPN status, as well as the firewall status on the
device.
RV340x Administration Guide
3
Troubleshooting Tips
Getting Started
VPN Status
Port Statistics
Traffic Statistics
Troubleshooting Tips
If you have trouble connecting to the Internet or the web-based web interface:
• Verify that your web browser is not set to work offline.
• Check the local area network connection settings for your Ethernet adapter. The PC should obtain an IP
address through DHCP. Alternatively, the PC can have a static IP address in the 192.168.1.x range with
the default gateway set to 192.168.1.1 (the default IP address of the device).
• Verify that you entered the correct settings in the Wizard to set up your Internet connection.
• Reset the modem and the device by powering off both devices. Next, power on the modem and let it sit
for about 2 minutes. Then, power on the device. You should now receive a WAN IP address.
• If you have a DSL modem, ask your ISP to put the DSL modem into bridge mode.
Directs you to the VPN Status page that displays the status of the VPNs managed
by this device.
Directs you to the PortTrafficpage which displays the device’s port status and
port traffic.
Directs you to the TCP/IP Servicespage which displays the device’s port listen
status and the established connection status.
Directs you to the ViewLogs page which displays the logs on the device.View System Log
User Interface
The user interface is designed to make it easy for you to set up and manage your device.
Navigation
The major modules of the web interface are represented by buttons in the left navigation pane. Click a button
to view more options. Click an option to open a page.
Popup windows
Some links and buttons launch popup windows that display more information or related configuration pages.
If your web browser displays a warning message about the popup window, allow the blocked content.
Help
To view information about the selected configuration page, click Help at the top right corner of the web
interface. If your web browser displays a warning message about the popup window, allow the blocked content.
Logout
To exit the web interface, click Logoutnear the top right corner of the web interface. The sign-in page appears.
The user interface is designed to make it easy to set up and manage the device. The header toolbar icons are
described in the table below.
RV340x Administration Guide
4
Getting Started
User Interface
Table 2: Header Toolbar Options
DescriptionIcon
Toggle button – Located on the top left of the header – This toggle button helps to expand
or collapse the navigation pane.
Language Selection – This drop-down list allows you to select the language for the user
interface.
Help – The online-help documentation for the device.
About – The firmware version information for the device.
Logout – Click to log out of the device.
Icon Legend
This table displays the most common icons found throughout the graphical interface and their meanings.
Add – Click to add an entry.
Edit – Click to edit an entry.
Delete – Click to delete an entry.
Refresh – Click to refresh the data.
Reset counters – Click to reset the counters.
Clone – Click to clone the settings.
Export – Click to export the configurations.
RV340x Administration Guide
5
User Interface
Getting Started
Import – Click to import the configurations.
Save – Click to save the configurations.
Connected – Click to connect.
Disconnected – Click to disconnect.
Popup Windows
Some links and buttons launch popup windows that display more information or related configuration pages.
If the web browser displays a warning message about the popup window, allow the blocked content.
RV340x Administration Guide
6
Status and Statistics
This section provides information on the various configuration settings of your device and contains the
following topics:
• System Summary, on page 7
• TCP/IP Services, on page 9
• Port Traffic, on page 10
• WAN QoS Statistics, on page 11
• ARP Table, on page 11
• Routing Table, on page 12
• DHCP Bindings, on page 12
• Mobile Network, on page 13
• View Logs, on page 13
• Captive Portal Status, on page 14
System Summary
CHAPTER 2
The System Summary provides a snapshot of the settings on your device. It displays your device’s firmware,
serial number, port traffic, routing status, mobile networks, and VPN server settings. To view this System
Summary, click Status and Statistics > System Summary.
System Information
• Host Name – Name of host.
• Serial Number – Serial number of the device.
• System Up Time – Length of time in yy-mm-dd, hours, and minutes that the device has been active.
• Current Time – Current time and date.
• PID VID – Version number of the hardware.
Firmware Information
• Firmware Version – Version number of the installed firmware.
• Firmware MD5Checksum – A value used for file validation.
RV340x Administration Guide
7
System Summary
Status and Statistics
• WAN1MAC Address – The MAC address of WAN1.
• WAN2MAC Address – The MAC address of WAN2.
• LAN MAC Address – The MAC address of the LAN.
Port Status
• Port ID– Defined name and number of the port.
• Interface – Name of the port used for the connection.
• Link Status – Status of the link.
• Speed – The speed (in Mbps) of the device after auto negotiation.
Radio Status
Radio 1 (2.4GHz) and Radio 2 (5GHz)
• Wireless Radio – Displays if the wireless radio is enabled or disabled.
• MAC Address – MAC address for the wireless connection.
• Mode - Supported wireless network (802.11b/g/n for 2.4 GHz radio) and (802.11a/n/ac for 5 GHz radio).
• Channel - Bandwidth channel for wireless connection. (Channel 11 for 2.4GHz radio and channel 42
for 5 GHz radio).
• Operational Bandwidth
- Operational bandwidth for the wireless radio (20/40MHZ for 2.4GHz and 80MHz for 5 GHz)
IPv4 and IPv6
• Interface – Name of the interface.
• IP Address– IP address assigned to the interface.
• Default Gateway – Default gateway for the interface.
• DNS – IP address of the DNS server.
• Dynamic DNS – IP address of the DDNS for the interface: Disabled or Enabled.
• Renew – Click to renew the IP address.
VPN Status
• Type – Type of the VPN tunnel.
• Enabled – Is Enabled or Disabled.
• Configured – VPN tunnel’s status whether it is configured or not.
• Max Supported Sessions – The maximum number of tunnels supported on the device.
• Connected Sessions – Current status of the tunnel.
RV340x Administration Guide
8
Status and Statistics
TCP/IP Services
Firewall Setting Status
• Stateful PacketInspection (SPI) – also known as dynamic packet filtering, is enabled by default and
monitors the state of active connections. It uses this information to determine which network packets are
allowed through the firewall.
• Denial of Service (Dos) – Status of the Dos filter service is enabled (On) or disabled (Off). A DoS attack
is an attempt to make a machine or network resource unavailable to its intended users.
• Block WAN Request– Makes it difficult for outside users to work their way into your network by hiding
the network ports from Internet devices and preventing the network from being detected by other Internet
users.
• Remote Management – Indicates that a remote connection for managing the device is allowed or denied.
• Access Rule – Number of access rules that have been set.
Log Setting Status
• Syslog Server– Status of system logs.
• Email Log – Status of logs to send using email.
TCP/IP Services
The TCP/IP Services page displays the status of the protocol, port, and IP address. To view the TCP/IP services,
click Status and Statistics > TCP/IP Services.
Port Listen Status
• Protocol – Type of protocol used for communication.
• Listen IP Address – The listening IP address on the device.
• Listen Port– The listening port on the device.
Established Connection Status
• Protocol – Type of protocol used for communication.
• Local IP Address – IP address of the system.
• Local Port– Listening ports on different services.
• Foreign Address – IP address of the device connected.
• Foreign Port – Port of the device connected.
• Status – Connection status of the session.
RV340x Administration Guide
9
Port Traffic
Port Traffic
Status and Statistics
The Port Traffic page displays the status of the interfaces of the device. To view the device’s Port Traffic
page, click Status and Statistics >Port Traffic.
Port Traffic
• Port ID– Defined name and number of the port.
• Port Label– Name of the port.
• Link Status– Status of the link.
• Rx Packets– Number of packets received on the port.
• Rx Bytes – Number of packets received, measured in bytes.
• Tx Packets– Number of packets transmitted on the port.
• Tx Bytes – Number of packets transmitted and measured in bytes.
• Packet Error – Number of packets not successfully received on the device.
Wireless Traffic (RV340W)
• SSID Name – Name of the SSID.
• VLAN – VLAN ID.
• Radio Name – Name of wireless radio.
• Status– Wireless status.
• Rx Packets– Number of packets received on the port.
• Rx Bytes – Number of packets received, measured in bytes.
• Tx Packets– Number of packets transmitted on the port.
• Tx Bytes – Number of packets transmitted and measured in bytes.
• Multicast Packets– Number of multicast packets transferred on the device.
• Packet Error – Number of packets not successfully received on the device.
• Packet Dropped – Number of packets dropped by the device.
• Collisions – Number of packets colluded on the device.
• No of clients - Number of clients (devices) connected to the wireless.
Port Status
• Port ID– Defined name and number of the port.
• Port Label- Name of the port.
RV340x Administration Guide
10
Status and Statistics
• Link Status – Status of the interface.
• Port Activity – Status of the port (example: port enabled or disabled or connected).
• Speed Status – The speed (in Mbps) of the device after auto negotiation.
• Duplex Status – Duplex mode: Half or Full.
• Auto Negotiation – Status of the auto negotiation parameter. When enabled (On), it detects the duplex
mode, and if the connection requires a crossover, automatically chooses the MDI or MDIX configuration
that matches the other end of the link.
WAN QoS Statistics
The WAN QoS Statics page displays the statistics of the outbound and inbound WAN QoS. To view the
device’s WAN QoS Statics page, click Status and Statistics > WAN QoS Statistics.
• Interface – Name of the interface.
• Policy Name– Name of the policy.
WAN QoS Statistics
ARP Table
• Description – Description of the WAN QoS statistics.
• Counters last reset – Click Clear Countersto reset the counters.
Outbound QoS Statistics
• Queue – Number of outbound queues.
• Traffic Class – Name of traffic class assigned to queue.
• Packets Sent– Number of outbound packets of the traffic class sent.
• Packets Dropped – Number of outbound packets dropped.
Inbound QoS Statistics
• Queue – Number of inbound queues.
• Traffic Class – Name of traffic class assigned to queue.
• Packets Sent– Number of traffic class inbound packets sent.
• Packets Dropped – Number of inbound packets dropped.
The ARP Table lists all of the devices currently connected and their stats.
To open the Connected Devices page, click Status and Statistics > ARP Table.
• Hostname – Name of the connected device.
• IPv4 – The IPv4 address of the connected devices.
RV340x Administration Guide
11
Routing Table
• MAC Address – MAC address of the connected device.
• Type – Shows the type of the device IP address.
• Interface – Displays the connection to which VLAN it is connected.
IPv6
• IPv6 Address– Displays the IPv6 address of the connected device.
• MAC Address – MAC address of the connected device.
+ icon - Click the + icon to add a selected ARP table entry into the Static DHCP table.
Routing Table
Routing is the process of moving packets across a network from one host to a another. The routing table
contains information about the topology of the network immediately around it. To view the IPv4 and IPv6
routes, click Status and Statistics > Routing Table.
Status and Statistics
IPv4 and IPv6 Routes
• Destination – IP Address and subnet mask of the connection.
• Next Hop – IP address of the next hop. Maximum number of hops (the maximum is 15 hops) that a
packet passes through.
• Metric – Number of routing algorithms when determining the optimal route for sending network traffic.
• Interface – Name of the VLAN to which the route is attached to.
• Source – Source of the route (Connected, Dynamic).
DHCP Bindings
The DHCP Bindings table displays the status of the DHCP client information such as IPv4/IPv6 address,
MAC address, lease expires time and type of binding (static or dynamic). To view the device’s DHCP bindings,
click Status and Statistics > DHCP Bindings.
In the DHCP Bindings Table, the following is displayed:
• Host Name - Name of the host.
• IPv4 Address/IPv6Address – Assigned IP address to the clients.
• MAC Address – The MAC address of the clients’ assigned IP address.
• Lease Expires– Lease time for the client’s system.
• Type – Shows the status of the connection (Static or Dynamic).
• Action – Allows you to delete one of the connections from the binding table.
RV340x Administration Guide
12
Status and Statistics
Click the Refresh icon to refresh the data.
Mobile Network
Mobile networks enables a device and its subnets to be mobile while continuing to maintain IP connectivity
transparent to the IP hosts connecting to the network through this mobile device. To view the device’s mobile
network, click Status andStatistics > Mobile Network. Next, select the Interfaces from the drop-down list
(USB1 or USB2). Click Refresh to refresh mobile network status.
Connection
• Internet IPAddress – IP address served by the service provider.
• Subnet Mask – Mask served by the service provider.
• Default Gateway – Default gateway served by the service provider.
• Connection Up Time – Time duration of connected device.
Mobile Network
View Logs
• Current Dial-UpSession Usage – Data usage per session.
• Monthly Usage – Monthly data usage.
Data Card Status
• Manufacturer – Manufacturer of the device.
• Card Firmware– Firmware version provided by the manufacturer.
• SIM Status – Status of the SIM.
• IMSI – Unique number of the device.
• Carrier – Name or type of data carrier.
• Service Type – Data service type.
• Signal Strength– Strength of data signal.
• Card Status – Card status disconnected or connected.
The View Logs page displays all of the device’s logs. You can filter these logs based on category, severity,
or keyword. You can also refresh, clear, and export these logs to a PC or USB. To view the device’s logs,
follow these steps:
Step 1Click Status and Statistics > View Logs.
Step 2To view logs, First click Here(link) to enable the log feature. Then, under Logs Filtered By, select the appropriate option.
RV340x Administration Guide
13
Captive Portal Status
Status and Statistics
Category
Step 3Click Show Logs.
Note
Step 4Click any of the following options:
To configure log settings, see Log, on page 26.
• Refresh – Click to refresh logs.
• Clear Logs – Click to clear logs.
• Export Logs to PC – Click to export logs to PC.
• Export Logs to USB – Click to export logs on to a USB storage device.
Click any of the following to view logs:
• All – Displays all the logs.
• Category – Displays the selected category logs.
Select one of the options displayed to view the logs based on the severity.Severity
Enter a keyword to display the logs based on the keyword.Search Keyword
Captive Portal Status
Captive portal support enables a highly secure, customized guest access with multiple rights and roles. It
provides secure wireless Internet access to visiting customers and rapid authentication and connectivity for
employees who are using their personal mobile devices.
To open and see the Captive Portal Status, click Status and Statistics > Captive Portal Status.
Select the required SSID from the drop-down to see the following details.
Step 1Select the required SSID from the drop-down to see the following details:
• Username — Name of the connected user.
• SSID — Name of the network
• IP Address— IP address of the connected user.
• MAC Address — MAC address of the connected user.
• Auth — Authentication used by the connected user (Guest, Local or RADIUS).
• Tx Bytes — Number of packet transmitted and measured in bytes
• Rx Bytes — Number of packet received, measured in bytes.
• Connected Time— Time duration of connected device.
RV340x Administration Guide
14
Status and Statistics
Captive Portal Status
Step 2Select the required user and click Disconnect to disconnect the device. Then, click Refresh the refresh the data on the
page.
RV340x Administration Guide
15
Captive Portal Status
Status and Statistics
RV340x Administration Guide
16
CHAPTER 3
Administration
This section describes the device's administration features and contains the following topics:
• File Management, on page 17
• Reboot, on page 20
• Diagnostic, on page 20
• Certificate, on page 21
• Configuration Management, on page 22
File Management
The File Management provides a snapshot of your device. To view the File Management info, follow these
steps:
Step 1Click Administration> File Management. to see the following information:
System Information
• Device Model– Model number of the device.
• PID VID– PID and VID number of the device.
• Current Firmware Version – Current firmware version.
• Last Updated – Date of last firmware update.
• Last Version Available on Cisco.com – Latest firmware version.
• Last Checked – Date when last checked.
Signature
• Current Signature Version – Version of the signature.
• Last Updated – Last date of when an update was performed.
• Last Version Available on Cisco.com – Latest signature version.
• Last Checked – Date when last checked.
USB Dongle Driver
RV340x Administration Guide
17
Manual Upgrade
• Current DongleDriver Version – Version of built-in USB dongle driver.
• Last Updated – Last date of when an update was performed.
• Last Version Available on Cisco.com – Latest dongle driver version.
• Last Checked – Date when last checked.
Language Package
• Current Version – Version of the language package.
• Last Updated – Date when last updated.
• Last Version Available on Cisco.com – Latest language package version.
• Last Checked – Date when last checked.
Manual Upgrade
In the Manual Upgrade section, you can upload and upgrade to a newer version of the firmware, signature file, USB
dongle driver or language file.
Administration
Caution
Step 2If you select to upgrade from the USB drive, the device will search the USB flash drive for a firmware image file whose
name has one or more of the following: PID, MAC address, and Serial Number. If there are multiple firmware files in
the USB flash drive, the device will check the one with the most specific name, i.e. priority from high to low.
During a firmware upgrade, do not try to go online, turn off the device, shut down the PC, or interrupt the
process in any way until the operation is complete. This process takes about a minute, including the reboot
process. Interrupting the upgrade process at specific points when the flash memory is being written to may
corrupt it and render the device unusable.
Manual Upgrade
To update the device with a newer version of the firmware.
Step 1Select Administration > File Management.
Step 2In the Manual Upgrade section, select the file type (Firmware Image,Signature File,USB Dongle Driveror Language
File).
Step 3In the Upgrade From section, select an option (Cisco.com, PC, or USB) and click Refresh.
Step 4Check Reset all configuration/setting to factory defaults to reset all the configuration and apply factory defaults.
Step 5Click Upgrade to upload the selected image to the device.
Auto Update
18
The device supports loading a firmware from USB flash drive if the USB stick is present during the system
bootup. The device will search the USB flash drive for a firmware image file whose name has one or more
of the following: PID, MAC address, and Serial Number. If there are multiple firmware files in the USB flash
drive, the device will check the one with the most specific name, i.e. priority from high to low.
RV340x Administration Guide
Administration
Auto Update
• PID-MAC-SN.IMG
• PID-SN.IMG
• PID-MAC.IMG
• PID.IMG
The files with other names will be ignored. If the version is higher than the current version, it will be upgraded
to this image and the DUT will reboot. After that, the upgrade process will start again.
If it does not find a more recent image in the USB1, then it will check the USB2 using the same logic.
The device also supports loading a configuration file from a USB flash drive during the system bootup.
• The behavior only happens when the device is in factory default and attached with a USB flash drive
before it is.
• The device will search the USB flash drive for a config file whose name has one or more of the following:
PID,
MAC address, and Serial Number. If there are multiple firmware files in the USB flash drive, the device
will check.
the one with the most specific name, i.e. priority from high to low.
• PID-MAC-SN.xml
• PID-SN.xml
• PID-MAC.xml
• PID.xml
The files with the other names will be ignored.
Firmware Auto Fallback Mechanism
The device includes two firmware images in the flash to provide an Auto Fallback Mechanism so that the
device can automatically switch to the secondary firmware when the active firmware is corrupted or cannot
boot up successfully after five trials.
The Auto Fallback Mechanism operates as follows:
1. The device first boots up with the active firmware.
2. If the firmware is corrupted, it will switch to the secondary firmware automatically after the active firmware
has failed to boot up after 5 times. If the device gets stuck does not reboot automatically, you can turn off
the power, power on, wait for 30 seconds, then turn off the power, for 5 times to switch to the secondary
or inactive firmware.
3. After booting up with the secondary or inactive firmware, please check to see if anything is wrong with
the active firmware.
4. Reload the new firmware again if necessary.
RV340x Administration Guide
19
Administration
Reboot
Reboot
The Reboot allows users to restart the device with active or inactive images.
To access Reboot page, follow these steps:
Step 1Click Administration >Reboot.
Step 2In the Active Image after Reboot section, select an option (Active Imagex.x.xx.xx or Inactive Image x.x.xx.xx) from
the drop-down list.
Step 3Select the preferred reboot option.
• Reboot the device.
• Return to factory default settings after reboot.
• Return to factory default settings including certificates after reboot.
Step 4Click Reboot to reboot device.
Diagnostic
Your device provides several diagnostic tools to help you with troubleshooting network issues. Use the
following diagnostic tools to monitor the overall health of your network.
Using Ping or Trace
You can use the Ping or Trace utility to test connectivity between this device and another device on the
network. To use Ping or Trace, follow these steps:
Step 1Select Administration > Diagnostic.
Step 2In the Ping or Trace an IP Address section, in the IP Address/Domain Name field, enter an IP address or domain name.
Step 3Click Ping. The ping results appear. This tells you if the device is accessible. Or click Traceroute. The traceroute displays
the route path.
Step 4To perform a DNS lookup, enter the IP address or domain name in the Perform a DNS Lookup>IP Address/Domain
Name field and click Lookup.
Step 5To view and export a technical support report, click one of the following options:
• Export To PC- Select this option to export the report to your PC.
• Export to USB - Select this option to export the report to a USB device.
• Email to - Select this option to email the report to an address.
RV340x Administration Guide
20
Administration
Certificate
Certificates are important in the communication process. The certificate signed by a trusted Certificate Authority
(CA), ensures that the certificate holder is really who he claims to be. Without a trusted signed certificate,
data may be encrypted, however, the party you are communicating with may not be the one whom you think.
A list of certificates with the certificate details are displayed on this page. You can export a Self signed, local,
and CSR certificate. Or, you can import a CA, Local, or PKCS#12 certificate. You can also import a certificate
file (from PC/USB) to a new certificate.
If a device certificate is imported, it replaces its corresponding CSR certificate.
On Certificate Table, the certificates that are associated to the device are displayed. You can you delete, export,
view the details, or import a certificate that is listed in the Certificate Table.
Import Certificate
To import a certificate, follow these steps:
Certificate
Step 1Click Import Certificate.
Step 2Select the type of certificate to import from the drop-down list:
• Local Certificate
• CA Certificate
• PKCS#12 encoded file.
Step 3Enter a certificate name. (For PKCS#12, you must enter a password).
Step 4Check Import from PC and click Choose File to upload and import the certificate from a specific location.
Step 5Check Import From USB and click Refresh to upload and import the certificate from a USB key.
Step 6Click Upload.
Generate CSR/Certificate
Step 1Click Generate CSR/Certificate.
Step 2Select the type of certificate to generate from the drop-down list.
Step 3Enter the following information:
Certificate Name
Enter a name for certificate. Certificate name should not contain spaces or special
characters.
Enter a name and select one of the following: IP Address,FQDN, or Email.Subject Alternative Name
Select a country from the drop-down list.Country Name
Enter a State or Province.State or Province Name
RV340x Administration Guide
21
Built-In 3rd-Party CA Certificates
Enter a locality name.Locality Name
Enter the name of the organization.Organization Name
Enter the name of the organization unit.Organization Unit Name
Enter a common name.Common Name
Enter the email address.Email Address
Select the Key Encryption Length from the drop-down menu. It should be 512, or 2048.Key Encryption Length
Enter the number of days (Range 1-10950, Default: 360).Valid Duration
Step 4Click Generate.
Built-In 3rd-Party CA Certificates
Administration
Step 1Click Show Built-In-3rd Party CA Certificates.
Step 2Select a certificate from the Certifcate Table and click the certificate icon to view the details of the ecrtificate.
Step 3Choose one of the following options:
• Export as PKCS#12 format - Select this option to expor this certificate as PKCS#12 format.
• Export as PEM format - Select this option to export as PEM certificate type.
• Select Destination to Export - Select this option to export to PC or USB.
Select as Primary Certificate
Step 1Click Select as Primary Certificate.
Step 2In the Certificate Table, select the check-box of the appropriate certificate and click Select as Primary Certificate.
Configuration Management
Config Management page provides details on the device’s file configurations.
Configuration File Name
The Configuration File Name displays the last changed time details on the following:
• Running Configuration - All configurations that the device is currently using are in the Running
Configuration file which is volatile and is not retained between reboots.
RV340x Administration Guide
22
Administration
Configuration Management
• Startup Configuration - Contains all configurations that were last saved which are loaded into the
Running Configuration file after reboot.
• Mirror Configuration - The device automatically copies the Startup configuration to the Mirror
configuration after 24 hours of running in stable condition (no reboots and no configuration changes
within the 24-hour period).
• Backup Configuration- It is simply an additional copy of configuration file used as a backup. It remains
unchanged until it is being written over.
Copy/Save Configuration
The Copy/Save Configuration section displays the default configuration of the device uses the running
configuration file, which is unstable and does not retain the settings between reboots. You can save this running
configuration file to the startup configuration file.
• Source – Select the source file name from the drop-down list.
• Destination – Select the destination file name from the drop-down list.
• Save Icon Blinking – Indicates whether an icon blinks when there is unsaved data. To disable/enable
this feature, click Enabled Save Icon Blinking or Disabled Save Icon Blinking.
RV340x Administration Guide
23
Configuration Management
Administration
RV340x Administration Guide
24
CHAPTER 4
System Configuration
The System Configuration section provides guidance when installing and configuring the device and contains
the following topics:
• System, on page 25
• Time, on page 26
• Log, on page 26
• Email, on page 28
• User Accounts, on page 29
• User Groups, on page 32
• IP Address Groups, on page 33
• SNMP, on page 34
• Discovery-Bonjour, on page 35
• LLDP, on page 35
• Automatic Updates, on page 36
• Schedules, on page 37
• Service Management, on page 37
• PnP (Plug and Play), on page 38
System
Your ISP may assign a hostname and a domain name to identify your device or require you to specify the
same. In the former case, the default values can be changed as needed. Follow these steps to assign a host and
domain name.
Step 1Click System Configuration > System.
Step 2In the Host Name field, enter a host name.
Step 3In the Domain Name field, enter a domain name.
Step 4Click Apply.
RV340x Administration Guide
25
System Configuration
Time
Time
Setting the time is critical for a network device so that every system log and error message is timestamped
for accurate tracking and synchronizing the data transfer with other network devices.
You can configure the time zone, adjust for daylight savings time if necessary, and select the Network Time
Protocol (NTP) server to synchronize the date and time.
To configure the time and NTP server settings, follow these steps;
Step 1Click System Configuration > Time.
Step 2Set TimeZone– Select your time zone relative to Greenwich Mean Time (GMT). It will show current synchronized time
and date.
Step 3Set Date and Time – Select Auto or Manual.
a) Auto – Check Default or User Defined for the NTP Server and enter a qualified NTP Server name.
b) Manual – Enter the date and time.
Step 4Set Daylight Savings Time– Check to enable daylight savings time. You can choose the Daylight Saving Mode – By
Date or Recurring and enter the start dates and end dates. You can also specify the Daylight Saving Offset in minutes.
Step 5Click Apply.
Log
One of the basic settings of a network device is its system log (Syslog), which is used to log the device data.
You can define the instances that should generate a log. Whenever such defined instance occurs, a log is
generated with the time and event and sent to a syslog server or sent in an email. Syslog can then be used to
analyze and troubleshoot a network and to increase the network security.
Configure Log Settings
To configure the log settings, follow these steps:
Step 1Click System Configuration > Log.
Step 2Under Log Setting, in the Log section, check Enable.
Step 3In the Log Buffer field, enter the number of KB (Range 1 KB to 4096 KB, Default is 1024 KB). It is an area in memory
where redo is temporarily stored before it can be written to a disk. The acceptable range of the size is 1 to 4096 KB; and
the default size is 1024 KB.
Step 4Select the appropriate log severity level from the Severity drop down list. They are listed from the highest to the lowest.
Level 0, which means that the system is unusable.Emergency
Level 1, which indicates that immediate action is needed.Alert
Level 2, which indicates that the system is in critical condition.Critical
Level 3, which indicates that there is an error in the device, such as a single port being off-line.Error
RV340x Administration Guide
26
System Configuration
Email Server
Warning
Level 4, which indicates that a warning message is logged when the device is functioning
properly, but an operational problem has occurred.
Notification
Level 5, which indicates a normal but significant condition. A notification log is logged when
the device is functioning properly, but a system notice has occurred.
Level 6, which indicates a condition that is not a condition error, but requires special handling.Information
Debugging
Level 7, which indicates that the debugging messages contain information normally of use only
when debugging a program.
Step 5Check All or any of the required event categories that you want logged on the device.
Logs involving kernel code.Kernel
Logs involving license violations.License
Logs related to user-space applications such as NTP, Session, and DHCP.System
Logs related to events that triggered web filtering.Web Filter
Logs related to firewall rules, attacks, and content filtering.Firewall
Logs related to application control.Application Control
Logs related to routing, DHCP, WAN, LAN, and QoS.Network
Logs related to users activities.Users
VPN
VPN-related logs including instances like VPN tunnel establishment failure, VPN gateway
failure, and so on.
Logs from the 3G/4G dongles which are plugged into the device.3G/4G
Logs related to SSLVPN.SSLVPN
Logs related to wireless.Wireless (RV340W)
Logs related to Cisco's Plug-n-Play.PnP
Logs related to antivirusAntivirus
Logs related to the intrusion prevention system (IPS).IPS
Step 6To save the logs to a USB drive, check Enable in the Save to USB Automatically section, and select the USB to save
the logs.
Email Server
The email server can be configured to your email account. The email server logs are periodically sent to
specific email address, so that the administrator is always up to date on the network. The device supports
SMTP mail account configuration such as email addresses, password, message digest; optional parameters,
SMTP server port number, SSL, TLS.
Step 1In the Email Server section, check Email Syslogs to enable the device to send email alerts when events are logged.
RV340x Administration Guide
27
System Configuration
Remote Syslog Server
Step 2In the Email Settings section, click Link to Email Setting page to configure your email settings.
Step 3In the Email Subject section, enter the subject.
Step 4In the Severity section, select the severity level from the drop-down list.
Step 5In the Log Queue Length section, enter a range from 1 to 1000. The default is 50.
Step 6In the Log Time Threshold section, select the time threshold from the drop-down list.
Step 7In the Real Time EmailAlerts section, check All or any of the e-mail alerts categories that you want logged on the
device.
Remote Syslog Server
A remote syslog server allows you to separate the software that generates the messages and events from the
system that stores and analyzes them. When enabled, the network driver sends messages to a syslog server
on the local Intranet or Internet through a VPN tunnel. The syslog server can be configured by specifying the
name or IP address.
Step 1In the Syslog Server section, check Enable to enable sending system logs to a remote server.
Step 2In the Syslog Server fields, enter the information below:
Syslog Server 1
Syslog Server 2
Step 3Click Apply.
Enter the IP addess of the Syslog server to which the log messages should be sent
in addition to the local destination.
Select UDP or TCP.Transport
Enter the port value of the Syslog server.Port
Enter the IP addess of the Syslog server to which the log messages should be sent
in addition to the local destination.
Select UDP or TCP.Transport
Enter the port value of the Syslog server.Port
Email
You can configure your device’s email server to your specifications.
Configuring Email
To configure the email server, follow these steps.
Step 1Select System Configuration > Email.
Step 2Under Email Server, enter the following:
RV340x Administration Guide
28
System Configuration
User Accounts
Enter the address of the SMTP server.SMTP Server
Enter the SMTP port. Range (1 to 65535; Default - 25)SMTP Port
Select None or TLS/SSL as the email encryption method.Email Encryption
Authentication
Step 3Click Apply and Test Connectivity to Email Server to test connectivity. Click Clear if you which to clear the settings.
Step 4Click Apply.
Select the type of authentication from the drop-down list: None, Login, Plaintext or
MD5.
Enter an email address to send to.Send Email to 1
Enter an email address to send to (optional).Send Email to 2
Enter an email address to send from.From Email Address
User Accounts
You can create, edit, and delete local users and authenticate them using local database for various services
like PPTP, VPN Client, Web GUI login, and SSLVPN. This enables the administrators to control and allow
only the local users access the network.
To create local users and determine the password complexity, follow these steps:
Step 1Select System Configuration > User Accounts.
Step 2Under Web Login Session Timeout, enter the following information.
Administrator Inactivity Timeout
Guest Inactivity Timeout
Step 3Under Local Users Password Complexity, check Enable to enable the password complexity.
Step 4Configure the password complexity settings.
Minimal password length
Minimal number of
character classes
The new password mustbe
different than the current
one
Enter the minimum length of the password to create a new password (Range 0 to 64,
Default 8).
Enter the minimum number of character classes that should be used for the new password
(Range 0 to 4, Default 3). Compose a password using three of these four classes:
(Uppercase, letters, lower case letters, numbers or special characters).
Enable to require the user to enter a different password when the current password
expires.
Enter number of days for password expiry. (Range: 0 - 365, 0 means never expire).Password Aging Time
Enter the required admin's inactivity timeout value. By
default, 30 mins.
Enter the required guest's inactivity timeout value. By
default, 30 mins.
RV340x Administration Guide
29
System Configuration
User Accounts
Step 5In the Local User Membership List section, click Addto add a user and enter the following information:
Enter a username.Username
Enter a password.New Password
Confirm the password.New Password Confirm
Select a group (admin or guest) from the drop-down list.Group
Step 6Click Apply.
Step 7Click Import to import User Accounts. You can also download the user template using the Download button.
Step 8To enable external user authentication using RADIUS, LDAP, and AD use the Remote Authentication Service. Under
the Remote Authentication Service Table, click Add and enter the following information:
Specify a name for the domain.Name
Enter the desired password to use for the user account.New Password
Authentication Type
Select an authentication type: RADIUS (Remote AuthenticationDial-In User Service),
Active Directory (AD), or LDAP.
Primary Server
Enter the primary IP address of the RADIUS/Active Directory/LDAP server.
Port: Enter the backup port of the server.
Backup Server
If you have selected RADIUS as the Authentication Type, enterthe backup IP address
of the server.
Port: Enter the backup port of the server.
User Container Path
If you have selected Active Directory as the Authentication Type, enter the full path
information of the user container. This is where the user login information is available
for authenticating the same.
Base DN
If you have selected LDAP as the Authentication Type, enter the base distinguished
name (DN) of the LDAP server. The base DN is the location where the LDAP server
searches for users when it receives an authorization request. This field should match
the base DN that is configured on the LDAP server.
Preshared Key
If you have selected RADIUS as the Authentication Type, enter the preshared key of
the RADIUS server.
Reenter the preshared key of the RADIUS server to confirm it.Confirm Preshared Key
Step 9Click Apply.
Step 10To enable the service authentication sequences enter the following information:
RV340x Administration Guide
30
System Configuration
Remote Authentication Service
Service
Use Default
Customize: Primary
You can customize the configuration of below services:
• Web Login
• Site-to-site/Ez VPN and 3rd-Party Client-to-site VPN
• AnyConnect SSL VPN
• Captive Portal
• PPTP Server
• L2TP Server
• 802.1x
Note
For PPTP Server, L2TP Server, and 802.1x only Local DB and RADIUS
authentication types are supported.
You can toggle based on configuration of the service need. By default, for Web
Login, Site-to-site/Ez VPN and 3rd-Party Client-to-site VPN, Captive Portal, and
AnyConnect SSL VPN services Use Default is selected.
Note
If this option is enabled the Customize Primary and Customize Secondary
options will disabled.
You can select the required primary authentication type: None, Local DB, RADIUS
(Remote Authentication Dial-In User Service), LDAP, or Active Directory.
Customize: Secondary
You can select the required secondary authentication type: None, Local DB,
RADIUS (Remote Authentication Dial-In User Service), LDAP, or Active Directory
Step 11Click Apply.
Remote Authentication Service
To enable external user authentication using RADIUS and LDAP, use the Remote Authentication Service.
Step 1Under the Remote Authentication Service Table, click Add and enter the following information:
Specify a name for the domain.Name
RV340x Administration Guide
31
User Groups
System Configuration
Authentication Type
Primary Server
Backup Server
Preshared-Key
Confirm Preshared-Key
Select an authentication type from the following:
• RADIUS – a networking protocol that provides
centralized Authentication, Authorization, and
Accounting (AAA) management for users who connect
and use a network service.
• Active Directory – a Windows OS directory service
that facilitates working with interconnected, complex
and different network resources in a unified manner.
• LDAP – a Lightweight Directory Access Protocol.
Enter the IP address of the primary server.
Port – Enter the primary port of the server.
Enter the IP address of the backup server.
Port – Enter the backup port of the server.
If you have selected RADIUS as the Authentication Type,
enter the preshared key of the RADIUS server.
Reenter the preshared key of the RADIUS server to confirm
it.
Step 2Click Apply to save the settings. Click Edit or Delete to edit or delete an existing domain.
Note
The external database priority is always RADIUS/LDAP/AD/Local. If you add the Radius server on the device,
the Web Login Service and other services will use the RADIUS external database to authenticate the user.
There is no option to enable an external database for Web Login Service alone and configure another database
for another service. Once RADIUS is created and enabled on the device, the device will use the RADIUS
service as an external database for Web Login, Site to Site VPN, EzVPN/3rd Party VPN, SSL VPN, PPTP/L2TP
VPN, 802.1x.
User Groups
The administrator can create user groups for a collection of users that share the same set of services. Such
user groups can be authorized to access multiple services like Web Login, PPTP, L2TP, and EzVPN.
To create user groups, follow these steps:
Step 1Select System Configuration > User Groups.
Step 2Under the User Groups Table, click Add to create a new user group.
Step 3In the Group Name field, enter a name for the group.
Step 4Under the Local User Membership List, check the desired check boxes in the Join column to attach the list of users to
the group.
Step 5Under Services, select the services the user groups should have access to and enter the following information.
RV340x Administration Guide
32
System Configuration
IP Address Groups
Web
Login/NETCONF/RESTCONF
Site to Site VPN
EzVPN/3rd Party
SSL VPN
Specify the web login permissions granted to the users attached to the group:
• Disabled – No member of the user group can login to the Configuration Utility
using a web browser.
• Read Only – The members of the user group can only read the system status after
they login. They cannot edit any settings.
• Administrator – All members of the user group have full privileges to configure
and read the system status.
Check Permit in this groupto enable access to a site-to-site VPN policy.
• Click Add to open the Add Feature List pop up.
• Select a profile from the drop down list and click Add.
Check Permit in this groupto enable access to a site-to-site VPN policy.
• Click Add to open the Add Feature List pop up.
• Select a profile from the drop down list and click Add.
To enable access to aprticular policy for the group, select a profile from the Select a
Profile drop down list.
Check Permit to enable PPTP authentication.PPTP VPN
Check Permit to enable L2TP authentication.L2TP
Check Permit to enable 802.1x authentication.802.1x
Captive Portal
Step 6Click Apply.
Check the Permit in this group check box to enable captive portal authentication for the
group. Click Add to open the Add Feature List pop up. Select a profile from the drop
down list and click Add.
IP Address Groups
In order to configure and manage the application control policies and web filtering, you must set up the IP
address groups. To configure the IP address groups, follow these steps:
Step 1Click System Configuration > IP Address Groups.
Step 2In the IP Address Group Table, click Add to add a group and enter a name. To delete a group click Delete.
Step 3Click Add, enter the group name and then the following:
Select either IPv4 or IPv6 from the drop down list.Protocol
RV340x Administration Guide
33
SNMP
System Configuration
Type
Step 4To add a device, click Add and configure the following:
Device and OS Type
Step 5Click Apply.
Select the type of group from the drop-down list, and enter the address details:
• IP Address– Enter an IP address in the IP Address field.
• IP AddressSubnet – Enter an IP address in the IP Address filed and its subnet
mask in the Mask field.
• IP AddressRange – Enter the Start IP Address and End IP Address.
Enter the MAC address of the device to add to this IP group.Address Details
Select the type of device from the drop-down list.Device Type
Select the OS type from the drop-down list.OS Type
Enter the MAC address of the device to add to this IP group.MAC Address
Select the appropriate device type and OS from the drop-down list.
Select the type of group from the drop-down list, and enter the address details:
SNMP
Simple Network Management Protocol (SNMP) is an Internet-standard protocol for collecting and organizing
information about managed devices on IP networks and for modifying that information to change device
behavior.
Simple Network Management Protocol (SNMP) allows network administrators to manage, monitor, and
receive notifications of critical events as they occur on the network. The device supports v1, v2c, and v3
versions. The device acts as an SNMP agent that replies to SNMP commands from SNMP Network Management
Systems. The commands it supports are the standard SNMP commands get/next/set. It also generates trap
messages to notify the SNMP manager when alarm conditions occur. Examples include reboots, power cycles,
and WAN link events.
Step 1To configure SNMP for your device, enter the following information:
Check to enable SNMP.SNMP Enable
Check to allow user from the Internet.Allow user access from
Internet
Check to allow user access from VPN.Allowuser access fromVPN
Select the version from the drop-down list.Version
Enter a system name.System Name
Enter a system contact.System Contact
RV340x Administration Guide
34
System Configuration
Enter a system location.System Location
Enter a name for the community.Get Community
Enter a name for the community.Set Community
Step 2In the Trap Configuration section, enter the following:
Enter the IP address.Trap Receiver IPAddress
Enter the port number.Trap Receiver Port
Step 3Click Apply.
Discovery-Bonjour
Bonjour is a service discovery protocol that locates network devices such as computers and servers on your
LAN. When this feature is enabled, the device periodically multicasts Bonjour service records to the LAN to
advertise its existence.
Discovery-Bonjour
Note
For discovery of Cisco Small Business products, Cisco provides a utility that works through a simple toolbar
on the web browser called FindIt. This utility discovers Cisco devices in the network and displays basic
information, such as serial numbers and IP addresses. For more information and to download the utility, visit
www.cisco.com/go/findit.
To enable Discovery-Bonjour, follow these steps:
Step 1Select System Configuration > Discovery-Bonjour.
Step 2Check Enable, to enable Discovery-Bonjour globally. (It is enabled by default).
Step 3Check Apply. You can view the discovered devices under Bonjour Interface Control Table.
LLDP
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral protocol in the Internet Protocol Suite used
by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network.
The LLDP information is sent by the device’s interface at a fixed interval, in the form of an Ethernet frame.
Each frame contains one LLDP Data Unit (LLDPDU). Each LLDPDU is a sequence of type-length-value
(TLV) structure.
To configure LLDP, follow these steps:
Step 1Select System Configuration > LLDP.
RV340x Administration Guide
35
Automatic Updates
Step 2In the LLDP section, check Enable. (It is enabled by default).
Step 3In the LLDP Port SettingTable, check Enable LLDP to enable LLDP on an interface.
Step 4Click Apply.
Step 5In the LLDP Neighbors Setting Table, the following information is displayed:
• Local Port– Port identifier.
• Chassis ID Subtype – Type of chassis ID (for example, MAC address).
• Chassis ID – Identifier of the chassis. Where the chassis ID subtype is a MAC address, the MAC address of the
device is displayed.
• Port IDSubtype – Type of the port identifier.
• Port ID– Port identifier.
• System Name – Name of the device.
• Time toLive – Rate in seconds at which LLDP advertisement updates are sent.
Step 6To view details about an LLDP port, select the Local Port and click Detail.
Step 7To refresh the LLDP Neighbors Setting Table, click Refresh.
System Configuration
Automatic Updates
Upgrading to the latest firmware can help fix bugs and other intermittent issues on the device. For this purpose,
the device can be configured to send you email notifying you of important firmware updates for your device.
The information can be configured to be sent at specified intervals and for specific types of network events.
Before you can configure these notifications, the email server should be configured.
To configure the Automatic Updates, follow these steps:
Step 1Select System Configuration > Automatic Updates.
Step 2From the Check Everydrop-down list, choose how often the device should automatically check (Never,Week, or
Month) for possible firmware revisions. Click Check Now to check immediately.
Step 3In the Notify via field, check Email to and enter the email address. The notifications are sent to a configured email address.
If you haven’t configured an email server, you should click the link in the note given beside the email field and configure
the email server.
Step 4Under Automatic Update, select Notify to receive notifications for updates.
Step 5Select the time from the drop-down list of when the firmware is automatically updated. You can select to receive
notifications and configure the updates for the following:
• System Firmware
• USB Modem Firmware
• Security Signature
RV340x Administration Guide
36
System Configuration
Schedules
Step 6Click Apply.
Schedules
The network devices should be protected against intentional attacks and viruses that could compromise
confidentiality or result in data corruption or denial of service. Schedules can be created to apply firewall or
port forwarding rules on specific days or time of day.
To configure the schedule follow these steps.
Step 1Select System Configuration > Schedules.
Step 2In the Schedule Table, click Add to create a new schedule. You can edit an existing schedule by selecting it and clicking
Edit.
Step 3Enter a name to identify the schedule in the Name column.
Step 4Enter the desired Start Time and End Time for the schedule.
Step 5Check Everyday to apply the schedule to all the days of the week. Leave it unchecked if you want it to only apply to
certain days. If so, then check the desired days of the week you want to apply the schedule to. You can also choose
Weekdayor Weekend.
Step 6Click Apply.
Service Management
The Service Management section displays information on the system configuration. You can add a new entry
to the Service Management list or to change an entry. To configure the Service Management follow these
steps.
Step 1Click System Configuration > ServiceManagement.
Step 2In the Service Table, click Add.
Step 3In the Application Name field, enter a name for identification and management purposes.
Step 4In the Protocol field, select the Layer 4 protocol that the service uses from the drop-down list: (All,TCP & UDP, TCP,
UDP, IP, ICMP).
Step 5In the Port Start/ICMP Type/IP Protocol, enter the port number, ICMP type, or IP protocol.
Step 6In the Port End field, enter port number.
Step 7Click Apply.
Step 8To edit an entry, select the entry and click Edit. Make your changes, and then click Apply.
RV340x Administration Guide
37
PnP (Plug and Play)
PnP (Plug and Play)
Network Plug and Playis a service that works in conjunction with Network Plug and Play enabled devices
to allow firmware and configuration to be managed centrally, and to allow zero-touch deployment of new
network devices. When installed, a Network Plug and Play enabled device will identify the Network Plug and
Play server through one of manual configuration, DHCP, DNS, or the Plug and Play Connect service.
To enable or disable Plug and Play, follow these steps:
Step 1Click System Configuration> PnP.
Step 2PnP is enabled by default. In the PnP Transport field, check one of the following options:
• Auto – PnP Server Discovery downloaded by PnP automatically.
• Static – Enter IP/FQDN, port number and select the certificate to be imported from the CA Certificate drop-down
list.
System Configuration
Step 3Click Apply.
Note
Please note that the router will verify that the identity configured in the server certificate matches the FQDN
or IP address that the router acquires from the DHCP, DNS or the configuration. If the FQDN or IP address is
not recognized, the router will refuse to connect to the server. For the Network Plug and Play to work correctly,
you should ensure that the certificate lists all variations of the server name and IP address(es) in the Subject
Alternative Name field. If you are experiencing issues with your certificate while trying to connect to PnP,
please see the Certificate, on page 21 instructions on how to manage your certificates on the device.
Plug and Play Connect Service
Plug and Play Connect is a Cisco-provided service that is the last resort used by a Network Plug and
Play-enabled device to discover the server. To use Plug and Play Connect for server discovery, you must first
create a Controller Profile representing the Manager, and then register each of your devices with the Plug and
Play Connect Service.
To access the Plug and Play Connect Service, follow these steps:
Step 1In your web browser, navigate to https://software.cisco.com.
Step 2Click the Log In button at the top right of the screen. Log in with a cisco.com ID associated with your Cisco Smart
Account.
Step 3Select the Plug and Play Connect link under the Network Plug and Play heading. The main page for the Plug and
Play Connect service is displayed.
Creating a Controller Profile
To create a Controller Profile, follow these steps:
RV340x Administration Guide
38
System Configuration
Registering Devices
Step 1Open the Plug and Play Connect web page https://software.cisco.com/#module/pnp in your browser. If necessary, select
the correct Virtual Account to use.
Step 2Select the Controller Profiles link, and then click Add Profile.
Step 3Select a Controller Type of PNP SERVER from the dropdown list. Then click Next.
Step 4Specify a name, and optionally a description for the profile.
Step 5Under the heading for Primary Controller, use the drop-down provided to select whether to specify the server by name
or IP address. Fill in the name or addresses of the server in the fields provided.
Step 6Select the protocol to use when communicating with the server. It is strongly recommended that HTTPS be used to ensure
the integrity of the provisioning process.
Step 7If the protocol selected is HTTPS and the server is configured with a self-signed certificate (default) or one that is not
signed by a well-known certificate authority, then the certificate used by the server should be uploaded using the controls
provided.
Step 8Click Next, and review the settings before clicking Submit.
Registering Devices
Certain products purchased directly from Cisco may be associated with your Cisco Smart Account at the time
of purchase, and these will automatically be added to Plug and Play Connect. However, the majority of Cisco's
100 to 500 series Plug and Play-enabled products will need to be registered manually. To register the devices
with Plug and Play Connect, follow these steps:
Step 1Open the Plug and Play Connect web page https://software.cisco.com/#module/pnp in your browser. If necessary, select
the correct Virtual Account to use.
Step 2Select the Devices link, and then click Add Devices. You may need to be approved to manually add devices to your
account. This is a one-time process, and, if it is required, you will be notified by email once approval has been granted.
Step 3Choose whether to add devices manually, or to add multiple devices by uploading details in CSV format. Click the link
provided to download a sample CSV file. If you choose to upload a CSV file, click the Browse button to select the file.
Then click Next.
Step 4If you selected to add devices manually, click Identify Device. Specify the Serial Number and Product ID for the device
to be added. Select a Controller Profile from the drop-down. Optionally enter a description for this device.
Step 5Repeat Step 4 until you have added all your devices, then click Next.
Step 6Review the devices that you have added, and then click Submit.
RV340x Administration Guide
39
Registering Devices
System Configuration
RV340x Administration Guide
40
WAN
This section covers the wide area network (WAN) and contains the following topics:
• WAN Settings, on page 41
• Multi-WAN, on page 44
• Mobile Network, on page 46
• Dynamic DNS, on page 47
• Hardware DMZ, on page 48
• IPv6 Transition, on page 48
WAN Settings
A wide area network (WAN) is a collection of geaographically distributed telecommunication or computer
network. The term distinguishes a broader telecommunication structure from a local area network (LAN). A
wide area network may be privately owned or rented and allows a business to effectively carry out its daily
functions regardless of its location.
There are two physical WAN1 and WAN2, and VLAN interfaces which can be configured on the device. To
configure the WAN settings, follow these steps
CHAPTER 5
Step 1Select WAN > WAN Settings.
Step 2In the WAN table, click Add or Edit and configure the settings for the IPv4, IPv6, or Advanced.
Step 3Select the sub-interface name and enter the VLAN ID.
IPv4 and IPv6 Connections
Step 4For an IPv4 connection, click the IPv4 tab.
Step 5Select the connection type from the list:
When the IPv4 or IPv6 connection uses DHCP
In the DHCP settings, enter the following information:
DNS Server
In DNS Server, select an option from the drop down list (UseDHCP Provided DNS or
Use DNS as Below).
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Check to enable and enter a prefix name.DHCP-PD (IPv6 only)
RV340x Administration Guide
41
WAN Settings
When the IPv4 or IPv6 connection uses Static IP
In the Static IP Settings, enter the following information:
WAN
Enter the Static WAN IP address.IP Address
Enter the netmask.Netmask
Default Gateway
Enter the IP address of the default gateway. Default Gateway is needed on this interface
to participate in the load balance and failover (Multi-WAN).
Select Use DNS as Below.DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Check to enable and enter a prefix name.DHCP-PD (IPv6 only)
When the IPv4 or IPv6 connection uses PPPoE
In the PPPoE Settings section, enter the following information:
Share same session with
IPv4
Separate IPv4 and IPv6
sessions
Select Share same session with IPv4 to re-use the same username/password configured
in IPv4 PPPoE setting, and obtain IPv4 and IPv6 addresses from the same PPPoE session.
Select Separate IPv4 and IPv6 sessions for a username/password setting that will be
used only for an IPv6 PPPoE session.
The username assigned to you by the ISP.Username
The password assigned to you by the ISP.Password
Select Use PPPoE Provided DNS Serveror Use DNS as Below.DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Connect Mode
Select Connect on Demand if your ISP charges when connected. Enter the maximum
idle time, in seconds, to wait before terminating the connection due to inactivity. Default
is 5 minutes.
Select Keep Aliveto periodically check the connection, and to re-establish the connection
when it is disconnected.
Authentication Type
Select the authentication type from the drop-down list (Auto,PAP, CHAP, MS-CHAP,
MS-CHAPv2).
Enter the name of the service.Service Name
Check to enable and enter a prefix name.DHCP-PD (IPv6 only)
Note
Some service providers do not allow to ping the default gateway, especially for the PPPoE connection. Please
go to Multi-WAN page to disable the “Network Service Detection” feature or choose a valid host to detect.
Otherwise, the traffic will not be forwarded by the device.
When the IPv4 connection is through PPTP
In the PPTP section, enter the following:
IP Assignment
For DCHP, select this option to enable DHCP to provide an IP address. For Static IP,
select this option and provide an IP address, netmask, and the IP address of the default
gateway.
Enter the name of the server.PPTP Server IP/FQDN
RV340x Administration Guide
42
WAN
WAN Settings
The username assigned to you by the ISP.Username
The password assigned to you by the ISP.Password
Select Use PPTP Provided DNS Server or Use DNS as Below.DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Connect Mode
Select Connect on Demand if your ISP charges when connected. Enter the maximum
idle time, in seconds, to wait before terminating the connection due to inactivity. Default
is 5 minutes.
Select Keep Aliveto periodically check the connection, and to re-establish the connection
when it is disconnected. .
Authentication Type
Select the authentication type from the drop-down list (Auto,PAP, CHAP, MS-CHAP,
MS-CHAPv2).
Check to enable MPPE encryption.MPPE Encryption
When the IPv4 connection uses L2TP
In the L2TP Settings section, enter the following information.
IP Assignment
For DCHP, select this option to enable DHCP to provide an IP address. For Static IP,
select this option and provide an IP address, netmask, and the IP address of the default
gateway.
Enter the name of the server.L2TP Server IP/FQDN
The username assigned to you by the ISP.Username
The password assigned to you by the ISP.Password
Select Use L2TP Provided DNS Server or Use DNS.DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Connect Mode
Select Connect on Demand if your ISP charges when connected. Enter the maximum
idle time, in seconds, to wait before terminating the connection due to inactivity. Default
is 5 minutes.
Select Keep Aliveto periodically check the connection, and to re-establish the connection
when it is disconnected.
Authentication Type
Select the authentication type from the drop-down list (Auto,PAP, CHAP, MS-CHAP,
MS-CHAPv2).
When the IPv4 connection uses Bridge
VLAN1 is the default.Bridge to
Enter the IP address.IP Address
Enter the netmask.Netmask
Enter the default gateway.Default Gateway
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
When the IPv6 connection uses SLAAC
RV340x Administration Guide
43
Multi-WAN
In the SLAAC Settings section, enter the following information:
Select Use DNS as Below from the drop-down list.DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Check to enable and enter a prefix name.DHCP-PD (IPv6 only)
Step 8Click the Advanced tab and configure the following:
WAN
MTU – Maximum
Transmission Unit
MAC Address Clone
Step 9Click Apply.
Note
Add any of these sub-interfaces to the Multi-WAN table to forward the default route traffic. Or it will only
forward the connected route traffic based on the routing table.
Multi-WAN
Select Auto to set the size automatically. To set the MTU size manually, select Manual
and enter the MTU size. (The size in bytes of the largest protocol data unit that the
layer can pass). Range is 576-1500 and Default is 1500 Bytes.
Check MAC Address Cloneand enter the MAC address. Click Clone My PC’sMAC
to use the MAC address of your computer as the clone MAC address for the device.
WAN failover and load balancing features provide efficient utilization of multiple WAN interfaces. Based
on the configuration, this feature can be used to distribute traffic among the interfaces. The Multi-WAN feature
provides the outbound WAN traffic, and load balancing over multiple WAN interfaces (WAN & USB) based
on a numeric weight assignment. It also monitors each WAN connection using repeated ping tests and
automatically routes outbound traffic to another WAN interface if connectivity is lost. The specific outbound
traffic rules can also be configured because of 5-tuple of a connection. Outgoing network load-balancing is
performed on a per IP connection basis; it is not channel-bonding, where a single connection uses multiple
WAN connections simultaneously. The VLAN interfaces of WAN can also be configured for load balance
or failover.
To configure the multi WAN settings, follow theses steps:
Step 1Select WAN > Multi-WAN Settings.
Step 2In the Interface Setting Table, configure the following:
• Interface – WAN interface name to apply the load balance and failover configuration. Select and check the desired
interface (WAN1, WAN2, USB1, or USB2).
• Precedence (for Failover) – Enter the priority value for the interface to bring up another connection on another
interface.
RV340x Administration Guide
44
WAN
Multi-WAN
• Weighted by Percentage or Weighted by Bandwidth (for Load-Balance) – Enter the weight percentage or value
for each connection. The interface routes traffic to the secondary connection if the primary connection's is overloaded
in an effort to balance the bandwidth load. To ensure full utilization of both connections, the ratio between the
connections' load balancing weights should reflect the ratio between the connections' bandwidths.
Note
In order to modify the “Weighted by Percentage” or “Weighted by Bandwidth” values, you must change the
“Precedence (For Failover)” value first to align with the different WAN interface(s).
Step 3Select an interface and click Edit and configure the following as described here:
• Network ServiceDetection - Check or uncheck to enable or disable the Network Service Detection.
• Retry Count – Number of times to ping a device. The range is 1 to 10 and the default is 3.
• Retry Timeout – Number of seconds to wait between the pings. The range is 1 to 300 and the default is 5 seconds.
• Detect Destination - Select Default Gateway or Remote Host and enter the host name to ping this device for
network service detection.
Step 4Click Apply to return to the Multi-WAN menu.
Step 5Next, check Enable Policy Based Routing to enable policy based routing.
Step 6In the Policy Binding Table, click Add or Edit or Delete. Policy Binding requires the interface to be used for specified
services. It allows the administrator to bind specific outgoing traffic to a WAN interface. Next, configure the following:
Enter a number for the priority.Priority
Source IP
Enter the source IP address, including the subnet mask, for example: 192.168.X.X/24
or ANY.
Destination IP
Enter the destination IP address, including the subnet mask, for example: 192.168.X.X/24
or ANY.
Services
Select a service from the drop-down list. If a service is not listed, you can click Service
Management to add it.
Outgoing Interface
Select the outgoing interface (WAN1, WAN2, USB1, or USB2) from the drop-down
list.
Failover to backup WAN
Select On or Off from the Failover to back up WAN drop-down list.
Note
If you select Off, the traffic is dropped when the binding interface goes off
line or down.
Select Enable or Disable to enable or disable the status of the policy.Status
Step 7You can also edit or delete a configuration by clicking Edit or Delete.
Step 8Click Apply.
Note
Some service providers do not allow to ping the default gateway. Please choose a valid remote host to detect
the network connectivity or simply disable the detection. Otherwise, the traffic will not be forwarded by the
device.
RV340x Administration Guide
45
Mobile Network
Mobile Network
A mobile broadband modem is a type of modem that allows a device to receive Internet access using a mobile
broadband connection instead of using phone or cable lines.
To configure the Mobile Network, follow these steps:
Step 1Select WAN > MobileNetwork.
Step 2In the Global Settings section, select the interface (USB1 or USB2) to apply the settings.
Step 3In the Card Status section, click the connect icon to establish the connection.
Step 4In the Service Type, select the type of service from the drop-down list.
Mobile Network Setup
WAN
To configure the Mobile Network Setup, follow these steps:
Step 1In the Configuration Mode, select Auto to connect to the network automatically.
Step 2Enter the SIM PIN - the pin code associated with your SIM card.
Step 3Or, select Manual and to connect to the network manually and configure the following:
• Access PointName – Enter the access point name provided by your mobile network service provider.
• Dial Number – Enter the number provided by your mobile network service provider for the Internet connection.
• Username andPassword – Enter the username and password provided by your mobile network service provider.
• SIM PIN – Enter the PIN code associated with your SIM card.
• Server Name– Enter the name of the server.
• Authenticate – Select the option to authenticate from the drop-down list. (None, both, PAP, CHAP).
Step 4Select one of the following for the Connect Mode.
• Connect on Demand – It specifies the connection timers after which the connection is terminated if there is inactivity.
Enter the Max Idle Time, in seconds, to wait before terminating the connection due to inactivity. Default is 5 minutes.
• Keep Alive – It checks the connection with device periodically, to re-establish the connection when disconnected.
In the Redial Period, enter the time in seconds for the device to check the connection automatically. Default period
is 30 seconds.
Step 5HiLinkMode - Some dongles like the Huawei E8372, support the HiLink mode. You can open the dongle’s configuration
page to configure more settings. To configure the HiLink Mode, follow these steps:
a) In the Configuration Mode, select HiLink to connect to the dongle.
b) Enter the Card Model number that is associated to your dongle.
c) Click Open HiLink Page to configure the settings on your dongle.
RV340x Administration Guide
46
WAN
d) Username and Password – Enter the username and password.
Bandwidth Cap Setting
The Bandwidth Cap Tracking limits the transfer of specified amount of data over a period. It is also known
as a band cap or data cap. To configure the Bandwidth Cap Setting, follow these steps:
Step 1Check Bandwidth Cap Tracking and enter the following:
• Monthly Renewal Date – Select number of days to apply the bandwidth cap settings.
• Monthly BandwidthCap – Enter the size of the data.
• Send an email to administrator if3G/4G usage has reached percentage of monthly bandwidthcap – Select
the percentage of data for monthly bandwidth cap. When the cap is reached, an email alert is sent to the administrator.
Step 2Click Apply.
Bandwidth Cap Setting
Dynamic DNS
Dynamic Domain Name System (DDNS) is a method of keeping a domain name linked to a changing IP
address since not all computers use static IP addresses. D DNS automatically updates a server in the DNS
with the active configuration of its hostnames, addresses, or other information. DDNS assigns a fixed domain
name to a dynamic WAN IP address. Hence, you can host your own web FTP, or another type of TCP/IP
server on your LAN. There are several DDNS services to choose from, most of which are free, or available
at a nominal cost. The most popular is DynDNS.
To configure dynamic DNS policies, follow these steps:
Step 1Select WAN > DynamicDNS.
Step 2In the Dynamic DNS Table, select the interface (WAN1, WAN2, USB1, or USB2) to add to the Dynamic DNS policy.
Step 3Click Edit.
Step 4Check Enable this Dynamic DNS policy to enable the policy configuration.
Step 5Select the name of service provider from the Provider drop-down list.
Step 6Enter a Username and Passwordfor the DDNS account.
Step 7Enter the full name of the device including the domain name in Fully Qualified Domain Name.
Step 8Check Enable to receive updates to Dynamic DNS provider and select the periodicity.
Step 9Click Apply.
Step 10Click Refresh to refresh the Dynamic DNS Table.
RV340x Administration Guide
47
Hardware DMZ
Hardware DMZ
A Demilitarized Zone (DMZ) accepts all incoming traffic and allows all outgoing traffic. A DMZ is a
subnetwork that is open to the public but behind the firewall. A DMZ allows you to redirect packets entering
your WAN port to a specific IP address. You can configure the firewall rules to allow access to specific
services and ports in the DMZ from both the LAN and WAN. If there is an attack on any of the DMZ nodes,
the LAN is not necessarily vulnerable. We recommend that you place hosts that must be exposed to the WAN
(such as web or email servers) in the DMZ network.
To configure the hardware DMZ configuration, follow these steps:
Step 1Select WAN > Hardware DMZ.
Step 2Click Enable to change the LAN4 to DMZ port.
WAN
Note
Click YES to proceed further.
Step 3Select Subnet to identify a subnetwork for DMZ services and enter the DMZ IP Address and Subnet Mask.
Step 4Select Range (DMZ & WAN within the same subnet) and enter the IP range.
Step 5Click Apply.
A warning messages pops-up when DMZ is enabled as: when DMZ is enable, the DMZ Port (LAN4)
configuration will be changed automatically as follows:
• Remove from LAG port (Section "LAN > Port Settings")
• Will disable the Port Mirror function, if the Port Mirror Destination is the DMZ Port (Section "LAN >
Port Settings")
• Remove from Monitoring Port of Port Mirror (Section "LAN > Port Settings")
• Administrative Status to "Force Authorized" (Section "LAN > 802.1X")
• Value of DMZ port in table "VLANs to Port Table" will change to "Exclude" (Section "LAN > VLAN
Membership")
IPv6 Transition
For migrating from IPv4 to IPv6, you can use an Internet transition mechanism called 6in4. The 6in4 uses
tunneling to encapsulate IPv6 traffic over configured IPv4 links. The 6in4 traffic is sent over the IPv4, in
which the IPv4 packet header. This is followed by the IPv6 packet whose IP headers have the IP protocol
number set to 41.
To configure the IPv6 transition, follow these steps:
Step 1Select WAN > IPv6Transition.
Step 2In the Tunnel Table, select the interface to be configured and click Edit.
Step 3Check Enable.
RV340x Administration Guide
48
WAN
Step 4Enter the description.
Step 5Select the Local Interface from the drop-down list (WAN1 or WAN 2).
Step 6Local IPv4 Address displays the address of the selected interface.
IPv6 in IPv4 Tunnel (6in4)
To add IPv4 Tunnel (6in4), enter the following information:
Step 1Click the IPv6 in IPv4 Tunnel (6in4) tab.
Step 2Enter the Remote IPv4 Address.
Step 3Enter the Local IPv6 Address.
Step 4Enter the Remote IPv6 Address.
Step 5Click Apply.
IPv6 in IPv4 Tunnel (6in4)
IPv6 Rapid Deployment (6rd)
In IPv6 Rapid Deployment (6rd), each ISP uses one of its own IPv6 prefixes instead of the special 2002::/16
prefix standardized for 6to4. Hence, a provider is guaranteed for its 6rd hosts availability from all native IPv6
hosts that can reach their IPv6 network.
To add IPv6 Rapid Deployment (6rd), enter the following information:
Step 1Click the IPv6 Rapid Deployment (6rd) tab.
Step 2Click Automatically from DHCP to use the DHCP (option 212) to obtain 6rd Prefix, Relay IPv4 Address, and IPv4
Mask Length.
Step 3Or, select Manual and set the following 6rd parameters.
a) Enter the IPv4 Address of Relay .
b) Enter the IPv4 Common Prefix Length.
c) Enter the IPv6 Prefix/Length. The IPv6 network (subnetwork) is identified by the prefix. All hosts in the network
have the identical initial bits for their IPv6 address. Enter the number of common initial bits in the network addresses.
Default is 64.
Step 4Click Apply.
RV340x Administration Guide
49
IPv6 Rapid Deployment (6rd)
WAN
RV340x Administration Guide
50
LAN
A local area network (LAN) is a computer network that spans within a relatively small areaclose to each other,
such as in an office building, a school, or a home. LANs are characterized by their topology, protocols, and
media
A LAN is useful for sharing resources like files, printers, games, or other applications. A LAN often connects
to other LANs, the Internet, or another WAN. This section contains the following topics:
Port Settings
CHAPTER 6
• Port Settings, on page 51
• PoE Settings (RV345P), on page 52
• VLAN Settings, on page 53
• LAN/DHCP Settings, on page 55
• Static DHCP, on page 58
• 802.1X Configuration, on page 58
• DNS Local Database, on page 59
• Router Advertisement, on page 59
The Port Settings page displays the ports for EEE, Flow Control, Mode, Port Mirror, and Link Aggregation.
To configure the port settings for the LAN, follow these steps:
Step 1Select LAN > Port Settings.
Step 2In the Basic Per Port Configuration table, configure the following:
Displays the name of the port.Port
Enter the port label.Port Label
Enabled
Ethernet)
Flow Control
Check to enable the port to allow the settings. When this check box is disabled, all settings
on the port are lost.
Check to allow port to consume less power during period of low data activity.EEE (Energy Efficient on
Check to enable to symmetric flow control. Flow control is used to send pause frames
and respecting pause frames to and from the LAN PC connected to the device.
RV340x Administration Guide
51
PoE Settings (RV345P)
Select the port setting mode from the drop-down list.Mode
Step 3In the Port Mirror Configuration section, enter the following information:
Check Enable to enable port mirror configuration.Enable
LAN
Destination Port
Monitored Port
Step 4In the Link Aggregation Configuration Table, enter the following information:
Unassigned
LAG1
Select anyone of the LANs (LAN1 to LAN4) .
(RV340) Select anyone of the LANs (LAN1 to LAN4) . (RV345/P) Select anyone of
the LANs (LAN1 to LAN16).
The port to monitor the traffic sending for mirroring.
Select anyone of the LANs (LAN1 to LAN4).
(RV340) Select anyone of the LANs (LAN1 to LAN4) . (RV345/P) Select anyone of
the LANs (LAN1 to LAN16).
Lists the name of the link group.Group Name
Select to remove the port from the LAG group.
Select anyone of the LANs (LAN1 to LAN4) from the drop-down list.
(RV340) Select anyone of the LANs (LAN1 to LAN4) from the drop-down list.
(RV345/P) Select anyone of the LANs (LAN1 to LAN16) from the drop-down list.
Select to apply link aggregation on appropriate port for traffic.
Select anyone of the LANs (LAN1 to LAN4) from the drop-down list.
(RV340) Select anyone of the LANs (LAN1 to LAN4) from the drop-down list.
(RV345/P) Select anyone of the LANs (LAN1 to LAN16) from the drop-down list.
Warning
Step 5Click Apply.
All the existing configurations on the ports (which are going to be part of LAG) are lost.
PoE Settings (RV345P)
Power over Ethernet (PoE) is a technology for LANs (local area networks) that allows a device to be operated
by electrical current which is transported by data cables rather than by electrical wires.
For PoE to work, the electrical current must pass thru the data cable at the power-supply end, and come out
at the device end, in such a way that the current is kept separate from the data signal so that neither interferes
with the other. The current enters the cable by means an injector. If the device at the other end of the cable is
PoE compatible, then that device will function properly without modification. If the device is not PoE
compatible, then a picker must be installed to remove the current from the cable.
The has a built-in 16-port and 8-port full-duplex 10/100/1000 Gigabit switch which can provide POE function.
To configure the PoE settings, follow these steps:
RV340x Administration Guide
52
LAN
Step 1Select LAN > PoE Settings.
Step 2In the Power Mode section, select Port Limit or Class Limit.
Port Limit Mode
• The power is limited to a specified wattage. For these settings to be active, the system must be in PoE port limited
mode.
Class Limit Mode
• The power is limited based on the class of the connected device. For these settings to be active, the system must be
in PoE Class limit mode.
Step 3Click Edit to edit either the Port Limit or Class Limit settings.
Step 4For Port Limit configure the following:
• PoE Enable— Check to enable.
• Power Priority Level — Select a priority level (Critical, High or Low).
VLAN Settings
• Administrative Power Allocation — Enter the milliwatts (mW) (Range: 0 - 30000, Default 30000).
Step 5For Class Limit configure the following:
• PoE Enable— Check to enable.
• Power Priority Level — Select a priority level (Critical, High or Low).
Step 8Simple Network Management Protocol (SNMP) Traps enable an agent to notify the management station of significant
events by way of an unsolicited SNMP message. To enable SNMP Traps, check Enable.
Step 9In the Power Trap Threshold, enter the threshold in %. (Range 1 - 99, Default 95).
Note
The PoE Properties Table displays the operational status and power levels used in the PoE.
VLAN Settings
Traffic on the port can be tagged by applying a specified VLAN. This tagging can help in differentiating the
traffic and forwarding it. There are only 32 VLANs in the system. If there are few VLANs used by WAN,
then LAN can use rest of them.
To configure the VLAN settings, enter the following information:
Step 1Select LAN > VLAN Settings.
Step 2In the VLAN Table, click Add.
Step 3Enter the VLAN ID.
RV340x Administration Guide
53
VLAN Settings
Step 4Check to enable the Inter-VLAN routing and the Device Management.
Step 5For the IPv4, enter the IPv4 address, prefix length, and subnet mask.
Step 6For the IPv6, enter the prefix, prefix length, and interface identifier.
Step 7Then, select the DHCP type (Disabled, Server, or Relay) for both the IPv4 and IPv6.
If you select Server, complete the following:
LAN
Lease Time
RangeStart and RangeEnd
Static DNS 1 and Static
DNS 2
WINS Server
Network Booting
DHCP Options
Amount of time (in minutes) that a network user is allowed to connect to the device
with the current IP address. Valid values are 5 to 43,200 minutes. The default is 1440
minutes (equal to 24 hours).
The range start and end of IP addresses that can be assigned dynamically. The range
can be up to the maximum number of IP addresses that the server can assign without
overlapping the PPTP and SSL VPN.
DNS service type; where the DNS server IP address is acquired.DNS Server
Static IP address of a DNS Server. (Optional) If you enter a second DNS server, the
device uses the first DNS server to respond to a request.
Optional IP address of a Windows Internet Naming Service (WINS) server that resolves
NetBIOS names to IP addresses. Default is 0.0.0.0.
Network booting or netboot is the process of booting a computer from a network rather
than a local drive. Check Enable to enable net booting.
When network booting is enabled the following two options will appear.
• Next Server: Enter the IP address of the next server in the boot process.
• Boot file: Enter the boot file name in the boot process.
• Option 66 – Enter the IP address or the hostname of a single TFTP server.
• Option 150 – Enter the IP addresses of a list of TFTP servers.
• Option 67 – Enter the boot filename.
• Option 43– Enter the vendor specific information. For example, specify the PnP
address with these strings “5A1N;K4;B2;I10.10.10.10;J80”.
If you select Relay, complete the following for IPv4:
For IPv6, complete the following:
Interface Identifier
RV340x Administration Guide
54
Enter the remote server address for IPv4.Remote Server Address
Enter the prefix and refix lenghtPrefixand Prefix Lenght
Enter the interface identifier. Interface IDs are used to identify an interface
on a link and thus must be unique on that link.
LAN
LAN/DHCP Settings
DHCP Type
Step 8Click Edit or Delete to edit or delete the VLAN table configurations.
Step 9In the Assign VLANs to ports table, click Edit to assign a VLAN to a LAN port. Specify the following information
for each of the VLAN listed in the table.
• Untagged – Select Untaggedfrom the drop-down list to untag the port. At least one LAN port should be untagged
for each VLAN.
• Tagged – Select Tagged from the drop-down list, to include the port as a member for the selected VLAN. Packets
sent from this port destined to the chosen VLAN will have the packets tagged with the VLAN ID. If there are no
untagged VLANs on a port, the interface automatically joins the VLAN1.
Select the DHCP type - Disabled or Server.
If you select the Server option, complete the following:
• Lease Time - Amount of time (in minutes) that a network user is allowed
to connect to the device with the current IP address. Valid values are 5
to 43,200 minutes. The default is 1440 minutes (equal to 24 hours).
• Range Start and End - The range start and end of IP addresses that
can be assigned dynamically. The range can be up to the maximum
number of IP addresses that the server can assign without overlapping
the PPTP and SSL VPN.
• DNS Server- DNS service type; where the DNS server IP address is
acquired.
• Excluded – Select Excluded from the drop-down list, to exclude the port from the selected VLAN. When the
untagged VLANs are excluded from a port, the port automatically joins the default VLAN.
Step 10Click Apply.
LAN/DHCP Settings
DHCP setup configures the DHCP server for relay or Option 82 (DHCP relay agent information option) for
LAN clients to obtain IP addresses. DHCP server maintains local pools and leases. It also allows LAN clients
to connect to a remote server for obtaining IP address.
Option 43 and 82 enable a DHCP relay agent to include information about itself when forwarding
client-originated DHCP packets to a DHCP server. The DHCP server can use this information to implement
IP addressing or other parameter-assignment policies.
By default the DHCP server is enabled for default VLAN. So if a PC is connected to any of the LAN port on
the device, it will get an automatic IP address from the default DHCP server.
To configure the LAN/DHCP settings, follow these steps:
Step 1Select LAN > LAN/DHCP Settings.
Step 2In the LAN/DHCP Settings Table click Add.
Step 3Select Interface, and click Next.
RV340x Administration Guide
55
LAN/DHCP Settings
Step 4To configure the DHCP for IPv4, select the DHCP type for IPv4.
LAN
Disabled
Disables the DHCP server for IPv4 on this device. There are no additional parameters
to complete.
The DHCP server assigns addresses to clients from their respective pools.Server
Relay
Sends the DHCP requests and replies from another DHCP server through the device.
Enter the remote DHCP server IPv4 address to configure DHCP relay agent.
Configuring DHCP for IPv4
Step 5Click Next and configure the following:
Client Lease Time
Amount of time (in minutes) that a network user is allowed to connect to the device
with the current IP address. Valid values are 5 to 43,200 minutes. The default is 1440
minutes (equal to 24 hours).
RangeStart and RangeEnd
The range start and end of IP addresses that can be assigned dynamically. The range
can be up to the maximum number of IP addresses that the server can assign without
overlapping the PPTP and SSL VPN.
DNS service type; where the DNS server IP address is acquired.DNS Server
Static DNS 1 and Static
DNS 2
WINS Server
Static IP address of a DNS Server. (Optional) If you enter a second DNS server, the
device uses the first DNS server to respond to a request.
Optional IP address of a Windows Internet Naming Service (WINS) server that resolves
NetBIOS names to IP addresses. Default is 0.0.0.0.
Network Booting
Network booting or netboot is the process of booting a computer from a network rather
than a local drive. Check Enable to enable net booting.
When network booting is enabled the following two options will appear.
• Next Server: Enter the IP address of the next server in the boot process.
• Boot file: Enter the boot file name in the boot process.
DHCP Options
• Option 66 – Enter the IP address or the hostname of a single TFTP server.
• Option 150 – Enter the IP addresses of a list of TFTP servers.
• Option 67 – Enter the boot filename.
• Option 43– Enter the vendor specific information. For example, specify the PnP
address with these strings “5A1N;K4;B2;I10.10.10.10;J80”.
Configuring DHCP type for IPv6
Step 6To configure the DHCP Mode for IPv6, enter the following:
Disables the DHCP on this device. There are no additional parameters to completeDisable
DHCP server that assigns addresses to clients from their respective pools.Server
Step 7Click Next and configure the following:
RV340x Administration Guide
56
LAN
LAN/DHCP Settings
Client Lease Time
Amount of time that a network user is allowed to connect to the device with the current
IP address. Enter the amount of time in minutes. Valid values are 5 to 43,200 minutes.
Default is 1460 minutes (24 hours). For example, if the device uses the default LAN
IP address, 192.168.1.1, the starting value must be 192.168.1.2 or greater.
Starting address of the IPv6 address pool.Range Start
Ending address of the IPv6 address pool.Range End
Type of DNS (server static), proxy, or the DNS server provided by your ISP.DNS Server
Static DNS1 and DNS2
(Optional) IP address of a DNS server. If you enter a second DNS server, the device
uses the first DNS server to respond. Specifying a DNS server can provide faster access
than using a DNS server that is dynamically assigned. Default is 0.0.0.0.
Configuring Option 82 Circuit
Step 8To configure the Option 82 Circuit enter the following information.
Enter description for option 82 client.Description
Circuit ID/ASCII
Enhances the validation security to determine about the information which is provided
in the Option 82 Circuit ID. Enter the circuit ID and select its format from the drop-down
list.
If you select HEX as the format for the Circuit ID/ASCII, enter the bitmask.Bitmask
Step 9Click Next and enter the following:
Enter the IP address and subnet mask of the device.IP Address& Subnet Mask
Step 10Click Next.
Step 11To add a new DHCP Configuration, configure the following:
Client Lease Time
Amount of time that a network user is allowed to connect to the device with the current
IP address. Enter the amount of time in minutes. Valid values are 5 to 3200 minutes.
Default is 1460 minutes (24 hours).
RangeStart and Range End
The range start and end of IP addresses that can be assigned dynamically. The range
can be up to the maximum number of IP addresses that the server can assign without
overlapping the PPTP and SSL VPN. For example, if the device uses the default LAN
IP address, 192.168.1.1, the starting value must be 192.168.1.2 or greater.
DNS service type; where the DNS server IP address is acquired.DNS Server
Static DNS 1 and Static
DNS 2
WINS Server
Static IP address of a DNS Server. (Optional) if you enter a second DNS server, the
device uses the first DNS server to respond to a request.
Optional IP address of a Windows Internet Naming Service (WINS) server that resolves
NetBIOS names to IP addresses. Default is 0.0.0.0.
DHCP Options
• Option 66 – Enter the IP address or the hostname of a single TFTP server.
• Option 150 – Enter the IP addresses of a list of TFTP servers.
• Option 67 – Enter the boot filename.
RV340x Administration Guide
57
Static DHCP
Step 12Click Ok, then click Apply.
Static DHCP
Static DHCP allows an IPv4 address to the defined MAC.
To configure static DHCP follow these steps:
Step 1Select LAN > Static DHCP.
Step 2Click Add.
Step 3In the Static DHCP Table, enter a name in the Name field.
Step 4Enter the IPv4 and MAC addresses in the respective fields.
Step 5Check Enable.
Step 6Click Apply.
LAN
802.1X Configuration
The IEEE 802.1X port-based authentication prevents unauthorized devices (clients) from gaining access to
the network. This network access control uses the physical access characteristics of the IEEE 802 LAN
infrastructures to authenticate and authorize devices attached to a LAN port, that has point-to-point connection
characteristics. A port in this context is a single point of attachment to the LAN infrastructure.
The device supports multiple-hosts mode. In this mode, only one of the attached hosts must be successfully
authorized for all hosts to be granted network access. If the port becomes unauthorized (re-authorization fails
or an EAPOL-logoff message is received), all attached clients are denied access to the network.
To configure port-based authentication:
Step 1Select LAN > 802.1X Configuration.
Step 2Check Enable Port-Based Authentication to enable the feature.
Note
Step 3Select the Administration Status in the 802.1X Configuration Table from the drop-down list.
802.1X requires the use of RADIUS for authentication. Ensure that the RADIUS server is defined in User
Accounts, on page 29.
• Force Authorized – Authorization is not needed. At least one LAN port must be force authorized.
• Auto – Enables port-based authentication. The interface moves between an authorized or unauthorized state based
on the authentication exchange between the device and the client.
Step 4Click Apply.
RV340x Administration Guide
58
LAN
DNS Local Database
Note
Ensure that the respective configuration is active and correct before enabling a Port-based authentication.
DNS Local Database
A local Domain Name Service (DNS) server, is used for accelerated DNS service response. DNS matches a
domain name to its routable IP address. For commonly used domain names a DNS local database which acts
as a local DNS server can give faster results than using an external DNS server. If a requested domain name
is not found in the local database, the request is forwarded to the DNS server that is specified on the Setup.
If you enable this feature, configure the client devices to use the device as the DNS server. By default, Windows
computers are set to obtain a DNS server address automatically from the default gateway.
To change the TCP/IP connection settings, for example, on a PC running Windows, follow these steps:
1. Go to the Local Area Connection Properties > Internet Protocol > TCP/IP Properties.
2. Choose Use the following DNS server address.
3. Enter the LAN IP address of the device as the Preferred DNS Server.
To add a new host, follow these steps:
Step 1Select LAN > DNS Local Database.
Step 2Click Add and enter the host name and IPv4 or IPv6 address. You can also edit or delete a DNS.
Step 3Click Apply.
Router Advertisement
The Router Advertisement Daemon (RADVD) is used for defining interface settings, prefixes, routes, and
announcements. Hosts rely on the devices on their local networks to facilitate communication to all other
hosts except those on the local network. The devices send and respond to the Router Advertisement messages
regularly. By enabling this feature, messages are sent by the router periodically and in response to solicitations.
A host uses the information to learn the prefixes and parameters for the local network. Disabling this feature
effectively disables auto configuration, requiring manual configuration of the IPv6 address, subnet prefix,
and default gateway on each device.
To configure the Router Advertisement, follow these steps:
Step 1Select LAN > Router Advertisement.
Step 2Select the VLAN ID from the drop-down list.
Step 3Check Enable to enable router advertisement and configure the following:
Advertisement Mode
Select the advertisement mode from the drop-down list (Unicast or Unsolocited
Multicast).
RV340x Administration Guide
59
Router Advertisement
LAN
Advertisement Interval
RA Flags
Router Preference
Maximum Transmission
Unit (MTU)
Router Lifetime
Enter the time interval between 10 and 1800 (Default is 30 seconds) at which the router
advertisement messages are sent.
Determines whether hosts can use DHCPv6 to obtain IP addresses and related information.
Select and check one of the following:
• Managed – Hosts use an administered, stateful configuration protocol (DHCPv6)
to obtain stateful addresses and other information through DHCPv6.
• Other – Uses an administered, stateful configuration protocol (DHCPv6) to obtain
other, non-address information, such as DNS server address.
Preference metric used in a network topology where multi-homed hosts have access to
multiple routers. Router Preference helps a host to choose an appropriate device. There
are three preferences to choose from, such as High, Medium, or Low. The default setting
is High. Select the preference from the drop-down list.
The MTU is the size of the largest packet that can be sent over the network. It is used in
the router advertisement messages to ensure that all nodes on the network use the same
MTU value when the LAN MTU is not well-known. The default setting is 1500 bytes,
which is the standard value for Ethernet networks. For PPPoE connections, the standard
is 1492 bytes. Unless your ISP requires a different setting, this setting should not be
changed. Enter a value between 1280 and 1500.
Enter the time in seconds for the router advertisement messages to exist on the route.
The default is 3600 seconds.
Step 4In the Prefix Table, click Add and enter a name for the prefix.
Step 5Enter the prefix length and the lifetime in the Prefix Length and Lifetime fields.
Step 6Click Apply.
RV340x Administration Guide
60
Wireless (RV340W)
A Wireless Local Area Network (WLAN) is a wireless distribution method that implements a flexible data
communication system using high-frequency radio waves and often includes an access point to the Internet.
This is achieved by augmenting, rather than replacing a wired LAN within a building or campus. Since the
WLANs use radio frequency to transmit and receive data, they don't require a wired connections. This allows
users to move around the coverage area, and still maintain a network connection.
This section describes the WLAN, which is a type of local-area network that uses high-frequency radio waves
rather than wires to communicate between nodes and contains the following topics:
• Basic Settings, on page 61
• Advanced Settings, on page 64
• Captive Portal, on page 66
• WPS, on page 67
Basic Settings
The RV340W provides Wireless LAN (WLAN), with all ports (LAN and WLAN) on single broadcast domain.
The device supports 802.11ac standard and concurrent dual-band selection at 2.4 GHz and 5 GHz. Depending
on the radio, you can select the frequency or channel for WLAN network data transmission and reception.
Selecting the appropriate channel width for each radio can improve the WLAN throughput.
CHAPTER 7
In Basic Settings, you can add, edit, or delete the wireless SSID settings, and select and configure the radio
channels. You can add up to four separate virtual wireless networks per Radio. In other words, you cannot
add more than eight SSIDs (that is, four SSIDs per radio); the Add button will be grayed out when you reach
this limit.
To configure the Wireless SSID settings, follow these steps:
Step 1Select Wireless > Basic Settings.
Step 2Under the Wireless Table, click Add or Edit.
Step 3Next, in the Add/Edit Wireless SSID Settings page, configure the following:
Specify the name of the network.SSID Name
Check Enable to enable the network.Enable
RV340x Administration Guide
61
Basic Settings
Wireless (RV340W)
Actively applied to Radio
SSID Broadcast
Security Mode
Select 2.4G or 5G band to connect only to a network matching both network settings
and band selection. The SSID will be created on the radio selected. Select Both to
configure the SSID on both the radios and connect this profile to an available network
with matching network settings.
Check to enable SSID broadcasting if you want to allow wireless clients within range
to detect this wireless network when scanning for available networks. Disable this feature
if you do not want to make the SSID known. If disabled, wireless clients can connect to
your wireless network only if they provide the SSID and the required security credentials.
Choose a security mode for the network from the following:
• None: Select this option for no security.
• WEP-64: Select the 64-bit WEP security mode and enter a WEP Key if you are
using old equipment that does not support WPA or WPA2 security. The WEP key
should be a string of 10 hexadecimal characters.
• WEP-128: Select the 128-bit WEP security mode and enter a WEP Key if you are
using old equipment that does not support WPA or WPA2 security. The WEP Key
should be a string of 26 hexadecimal characters.
• WPA2-Personal: Select Wi-Fi Protected Access II (WPA2) security protocol for
stronger security. If selected, enter an alphanumeric pass phrase.
• WPA-WPA2-Personal: Select this security protocol for stronger security when
you allow both WPA and WPA2 clients to connect simultaneously. If selected,
enter an alphanumeric pass phrase.
Protected Management
Frames (PMF)
WirelessIsolation withSSID
WMM
• WPA2-Enterprise: Select this security protocol to use RADIUS server
authentication. If selected, specify the following:
• Radius ServerPort (port used to access the RADIUS server).
• Radius Secret(shared RADIUS secret).
• WPA-WPA2-Enterprise: Select this security protocol to use the RADIUS server
authentication when you allow both WPA and WPA2 clients to connect
simultaneously. If selected, specify the Radius Server IP Address, Radius Server
Port, and Radius Secret.
PMF can be configured if WPA/WPA2 is configured as security mode. Select Notrequired, capable or Required for PMF.
Check Enable to enable wireless isolation within the SSID. When wireless isolation is
configured, wireless clients will not be able to see or communicate with each other when
connected to the same SSID.
To prioritize and queue the traffic according to the Access Category (AC), check Enable
to enable the Wireless Multimedia Extensions (WME). Enabling WME may result in
more efficient throughput, but higher error rates within a noisy Radio Frequency (RF)
environment.
RV340x Administration Guide
62
Wireless (RV340W)
Configuring 2.4 GHz Radio
WPS
VLAN
Time of Day Access
MAC Filtering
Captive Portal
Step 4Click Apply.
Check to enable Wi-Fi Protected Setup (WPS). It allows up to two usage modes: PIN
and Push Button. If enabled, click Configure and set up the WPS parameters in the
pop-up. For more information on configuring WPS, see WPS, on page 67.
Specify the VLAN ID, the SSID should be mapped to. Devices connecting to this network
are assigned addresses on this VLAN. The default VLAN ID is 1 and if all the devices
are on the same network, this can be left unchanged.
Specify the time period if the SSID shall be available only for certain hours every day
or for certain days in every week. Thus, you can further protect your network, by
specifying when users can access the network, thereby restricting access to it.
You can use MAC Filtering to permit or deny access to the wireless network based on
the MAC (hardware) address of the requesting device. Check to enable MAC filtering
for the SSID. If enabled, click Configure and specify the MAC blocklist (devices to be
prevented from accessing) and allowlist (devices to be permitted to access) for the wireless
network.
Check to enable Captive Portal verification for the SSID and select a portal profile from
the drop-down list. If enabled, you can also click New. and configure a new profile. See
Captive Portal, on page 66 for more information on adding a new Captive Portal Profile.
Configuring 2.4 GHz Radio
You can enable or disable the dual-band frequencies — 2.4 GHz and 5 GHz — that are supported by the
device. You can also specify the channel number for each band or choose Auto Channel Selection. These
settings will be applied to all virtual wireless networks. Depending on the radio selected, the WLAN network
transmits and receives data on the specific frequency, or channel selected. Selecting an appropriate channel
width for each radio can improve the WLAN throughput.
To configure the concurrent channel selection parameters, follow these steps:
Configuring 2.4 GHz Radio
Step 1Click Wireless >Basic Settings >2.4G.
Step 2Check Enable to enable the radio 2.4 GHz band.
Step 3Select the network band mode (B Only, G Only,N Only,B/G-Mixed, G/N-Mixed, orB/G/N-Mixed) from the Wireless
Network Mode drop-down list.
Step 4Check 20 MHz or 20/40 MHz to select the channel bandwidth.
Step 5Select the primary channel by clicking the lower or upper radio button.
Note
Step 6Select an appropriate wireless channel from the drop-down list. You may choose Auto and let the system select the
channel.
You cannot select a primary channel if you have selected 20 MHz bandwidth in Step 4 or Auto from the
drop-down list.
RV340x Administration Guide
63
Wireless (RV340W)
Configuring 5 GHz Radio
If you have selected Lower as your primary channel, you can select the channels 1 to 7. If you have selected Upper, you
can select channels 5 to 11.
Step 7To enable the Unscheduled Automatic Power Save Delivery (U-APSD) mode, and allow the connected clients that have
U-APSD feature, to save power, check U-APSD (WMMPower Save) . This uses mechanisms from 802.11e and legacy
802.11 to save power and fine-tune power consumption.
Step 8Maximum Associated Clients - Specify the maximum number of clients to be associated simultaneously (50 for 2.4G per
SSID, dy default).
Note
Step 9Click Apply.
The sum of the configured Max Associated Clients of all enabled SSIDs should not exceed 50 clients for 2.4G
(128 when MU-MIMO is enabled).
Configuring 5 GHz Radio
To configure the 5 GHz radio, follow these steps:
Step 1Click Wireless > Basic Settings> 5G.
Step 2Check Enable to enable the radio 5 GHz band.
Step 3Select the network band mode (A Only, N/AC-Mixed,or A/N/AC-Mixed) from the Wireless Network Mode drop-down
list.
Step 4Click the 20 MHz, 40 MHz, or 80 MHz radio button to select the channel bandwidth.
Step 5Select the primary channel by clicking Lower or Upper.
Note
Step 6Select an appropriate wireless channel from the drop-down list. You may select Auto and let the system select the
channel.
Step 7If you are using battery powered equipment and want to enable the Unscheduled Automatic Power Save Delivery
(U-APSD) mode, check the U-APSD (WMM Power Save).
Step 8Check Multi-User MIMO to enable. This Multi-User Multi-Input and Multi-Output (MIMO) method enables serving
up to four parallel groups simultaneously on the 5G band.
Step 9Maximum Associated Clients - Specify the maximum number of clients to be associated simultaneously (124 for 5G,
per SSID, by default).
You can select a primary channel, only if you have selected 40 MHz bandwidth.
Note
Step 10Click Apply.
The sum of the configured Max Associated Clients of all enabled SSIDs should not exceed 124 for 5G (128
when MU-MIMO is enabled).
Advanced Settings
For each radio, you can specify the advanced settings, such as Frame Burst, WMM No Acknowledgment,
Basic Rate, Transmission Rate, DTIM Interval, RTS Threshold, etc.
RV340x Administration Guide
64
Wireless (RV340W)
To configure the advanced settings under Wireless, follow these steps:
Check Enable to enable sending multiple frames with minimum inter-frame gap that
enhances network efficiency and reduces overhead.
Check Enable to achieve efficient throughput. This may result in higher error rates in a
noisy Radio Frequency (RF) environment.
For Data Rate, click Setto Default , to select default values for the basic and transmission
rates.
Select the Basic Rate settings — the rates at which the Services Ready Platform can
transmit. The device advertises its basic rate to the other wireless devices in your network,
so they know which rates will be used. The Services Ready Platform will also advertise
that it will automatically select the best rate for transmission.
Select the Transmission Rate settings — the rate of data transmission depending on the
speed of your wireless network.
Clear-To-Send (CTS) Protection Mode is the mechanism used by the 802.11 wireless
networking protocol to reduce frame collisions caused by the hidden node problems. By
default, this is set to Auto. To disable it, click Disabled.
Specify the Beacon Interval (the time interval between beacon transmissions) in
milliseconds. A beacon is a packet broadcast by the device to synchronize the wireless
network and the time at which a node (like an AP) must send a beacon is known as Target
Beacon Transmission Time (TBIT), expressed in Time Unit (TU). The range is 40 to
3500 milliseconds, default is 100.
DTIM Interval
Fragmentation Threshold
RTS Threshold
Step 3Click Apply.
Specify the Delivery Traffic Indication Map (DTIM Interval). This informs the clients
about the presence of buffered multicast/broadcast data on the Access Point. It is generated
within the periodic beacon at a frequency specified by the DTIM Interval. The range is
1 to 255, default is 1.
Enter the Fragmentation Threshold value that specifies the maximum size for a packet
before data is fragmented into multiple packets. If you experience a high packet error
rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation
Threshold too low may result in poor network performance. The range is 256 to 2346,
default is 2346.
In the RTS Threshold field, enter the Request-To-Send (RTS) threshold size. If a network
packet is smaller than the specified threshold size, the RTS/CTS mechanism will not be
enabled. The range is 0 to 2347, default is 2347.
Select the volume of data to be transmitted from the drop-down list.Tx Power
RV340x Administration Guide
65
Wireless (RV340W)
Captive Portal
Captive Portal
The Captive Portal feature provides clients, with a controlled and authenticated access to network resources,
without compromising security. In other words, a client connecting to the WLAN interfaces is limited to a
“walled garden” until authorized. The captive portal displays a special web page to authenticate clients before
they can use the Internet. The client can resolve DNS and web browser websites specifically added to such a
“walled garden”. Authentication uses a captive portal that initiates authentication. When a unauthenticated
client tries to connect to a web page (on port 80), the request is intercepted by a daemon and redirected to the
captive portal (UI port)
You can configure Captive Portal for each virtual wireless network on your device by associating it with a
portal profile. You can also view the Captive Portal status by choosing Status andStatistics > CaptivePortalStatus. See Basic Settings, on page 61 for instructions on how to enable a Captive Portal profile.
To create Captive Portal Profile:
Step 1Click Wireless > Captive Portal.
Step 2On the Captive Portal page, click Add under Portal Profile Table. To modify an existing Portal Profile, check the
corresponding check box and click Edit.
Step 3On the Add Captive Portal Profile page, configure the following:
Enter a name for the new Captive Portal profile.Profile Name
Choose if you want to enable (Auth) or disable (No Auth) authentication.Authentication
After user login, redirect to
Idle Timeout
Step 4In the Portal Page Customization section, configure the following:
Select Original URL, or A New URL and enter the URL in the text field, to redirect
users to a URL after authentication.
Set the lifetime of the authentication in seconds, ranging from 0-1440. 0 indicates infinite
time.
Select a font color, from the drop-down list, for the text you want to display on the page.Font Color
Click Browse and select an image to be displayed as the background of the portal page.Background Picture
Specify the company name to be displayed.Company Name
Click Browse and select the image of the company logo to be displayed.Company Logo Picture
Enter the welcome message to be displayed at login.WelcomeMessage
Enter the text for user name field.Username Field
Enter the text for password field.Password Field
Enter the text displayed on the login button.Login Button Name
Enter standard Copyright text associated with your company.Copyright Message
Check Show Agreement to accept the terms of use.Show Agreement
RV340x Administration Guide
66
Wireless (RV340W)
Step 5Click Apply.
To preview this profile, click Preview. To enable Captive Portal for specific user accounts, see System Configuration
> User Accounts, and System Configuration > User Groups.
WPS
WPS
Enter a title for the Agreement text.Agreement Title
Enter the Agreement terms to be displayed.Agreement Message
Wi-Fi Protected Setup (WPS) is a network security feature that allows WPS-enabled clients to easily and
securely connect to the wireless network. There are three methods to connect to the wireless network that are
supported by WPS: WPS push button, WPS PIN number through your client’s device, and Device PIN number
generated on the WPS configuration page.
To configure WPS:
Step 1Click Wireless > WPS. The Wi-Fi Protected Setup page appears. In order to use WPS, please ensure you have enabled
SSID and WPS, click the link to manage the wireless basic settings.
Step 2Select the SSID (for which the WPS is to be configured) from the WPS drop-down list.
Step 3Select the radio band (2.4G, 5G, or Both) from the radio drop-down list.
Step 4Configure the WPS on client devices in one of the following three methods:
a) Click WPS on the client, and then click WPS on this WPS configuration page.
b) If your client device has a WPS PIN number, enter the number in the text field and then click Register .
c) If the client device requires a PIN number from your device, click Generate and enter the PIN number.
In the PIN Lifetime field, choose the desired lifetime of the key. If the time expires, a new key is negotiated.
This completes the WPS configuration.
RV340x Administration Guide
67
WPS
Wireless (RV340W)
RV340x Administration Guide
68
IGMP Proxy
CHAPTER 8
Routing
This section describes routing, which is the process of selecting the best paths in a network. Dynamic routing
is a networking technique that provides optimal data routing. Dynamic routing enables devices to select paths
according to real-time logical network layout changes. The device’s routing protocol is responsible for the
creation, maintenance, and updating of the dynamic routing table in the dynamic routing. This section contains
the following topics:
• IGMP Proxy, on page 69
• RIP, on page 70
• Static Routing, on page 71
The Internet Group Management Protocol (IGMP) is used by hosts and devices on an IP network to create
multicast group memberships. IGMP can be used for resources of web and support applications like online
streaming for videos and games. The IGMP proxy enables the device to issue IGMP messages on behalf of
the clients behind it.
To enable the IGMP proxy follow these steps:
Step 1Select Routing > IGMP Proxy.
Step 2Check Enable IGMP Proxy to allow the device and the nodes to communicate with each other.
Step 3Select the Upstream Interface.
• WAN-Auto – The device can support multi-WAN. If selecting the WAN auto mode, the device will select the active
WAN as the upstream port. If multiple WANs are up and work in load balance mode, the WAN port with the lowest
port number will be the upstream port. For example, if WAN1 and WAN2 are in load-balance mode, the WAN1
will be the upstream port. If WAN1 is down, the WAN 2 will be the upstream port.
• Fixed Interface – The fixed interface will always use the selected port as the upstream port even if it is down. For
example, if WAN1 and WAN2 are in load balance mode, and you select WAN 2 as the upstream port, the WAN1
will not receive the multicast traffic regardless of whether the WAN2 is up or down. If selecting the Fixed Interface,
make sure to also choose between WAN 1, WAN 2 or a VLAN.
Step 4Select the Downstream Interface, WANor a VLAN.
RV340x Administration Guide
69
RIP
Step 5Click Apply.
RIP
Routing Information Protocol (RIP) is the standard IGP that is used on Local Area Networks (LAN). RIP
ensure a higher degree of network stability by quickly rerouting network packets if one of the network
connections goes off-line. When RIP is active, users experience little to no service interruptions due to single
device, switch, or server outages if there are sufficient network resources available.
To configure RIP, follow these steps:
Step 1Select Routing > RIP.
Step 2To enable RIP, check Enable RIP for IPv4 or for IPv6 or both and configure the following:
Routing
Interface
RIP version 1
RIP version 2
RIPng (IPv6)
Check Enable in the corresponding Interface to allow routes from upstream to be
received.
Note
Checking Enable for an interface automatically checks RIP version 1, RIP
version 2, RIPng (IPv6), and Authentication for that interface. Similarly,
unchecking Enable unchecks all.
This protocol uses classful routing and does not include subnet information or
authentication.
• Check Enable to enable sending and receiving routing information on RIP version
1.
• Check Passive to disable routing information from being sent on RIP version 1.
Note
Passive configuration is activated only when Enable is checked.
This is a classless protocol that uses multicast and has a password authentication.
• Check Enable to enable sending and receiving routing information on RIP version
2.
• Check Passive to disable routing information from being sent on RIP version 2.
Note
Passive configuration is activated only when Enable is checked.
Routing Information Protocol next generation (RIPng) uses User Datagram Packets
(UDP) to send routing information. This is based on RIP version 2 but used for IPv6
routing.
• Check Enable to enable RIP IPv6 routing.
• Check Passive to disable routing information from being sent over.
Note
RV340x Administration Guide
70
Passive configuration is activated only when Enable is checked.
Routing
Static Routing
Authentication
Step 3Click Apply.
Static Routing
Static Routing is a manually configured fixed pathway that a packet must travel to reach a destination. If there
is no communication between the devices on the current network topology, static routing can be configured
to communicate between the devices. Static Routing uses less network resources than dynamic routing because
they do not constantly calculate the next route to take.
This is a security feature that forces authentication of RIP packets before routes are
exchanged with other devices. This is not available for RIPv1.
• Check Enable to enable authentication so that routes are exchanged only with
trusted devices on the network.
• Password: Select the encryption authentication type — Plain (password is not
encrypted, but sent in plain text) or MD5 (password is hashed with message-digest
algorithm) — and enter the password.
Note
If you select MD5, an additional field will appear where you would
need to ad a MD5 Key ID first and then enter the password.
To configure static routing, follow these steps:
Step 1Select Routing > Static Routing.
Step 2For IPv4 Routes, in the Route Table, click Add or Edit and configure the following:
Network
Metric
Step 3Click Apply.
Step 4For IPv6 Routes, in the Route Table, click Add or Edit and configure the following:
Enter the destination subnetwork IP address to which you want to assign a static route
to.
Enter the subnet mask of the destination address.Mask
Enter the IP address of the gateway to the destination network.Next Hop
Enter the number of routing algorithms to determine the optimal route for sending network
traffic.
Choose the interface to use for this static route from the drop-down list.Interface
Enter the IPv6 prefix.Prefix
Enter the number of prefix bits of the IP address.Length
Enter the IP address of the gateway to the destination network.Next Hop
Metric
Enter the number of routing algorithms to determine the optimal route for sending network
traffic.
RV340x Administration Guide
71
Static Routing
Step 5Click Apply.
Routing
Choose the interface to use for this static route from the drop-down list.Interface
RV340x Administration Guide
72
Firewall
This section describes a firewall, which is a method designed to keep a network secure from intruders. The
firewall examines traffic and filters the transmissions that do not meet the specified security criteria. The
firewall decides which packets that are allowed or denied into or out of a network. This section contains the
following topics:
• Basic Settings, on page 73
• Access Rules, on page 74
• Network Address Translation, on page 76
• Static NAT, on page 76
• Port Forwarding, on page 77
• Port Triggering, on page 78
• Session Timeout, on page 78
• DMZ Host, on page 79
Basic Settings
CHAPTER 9
On the Basic Settings page, you can enable and configure the basic settings. You can also add trusted domains
to this list. To configure the basic settings, follow these steps:
Step 1Click Firewall > Basic Settings, and enter the following information:
Check Enable to enable the firewall settings; uncheck to disable.Firewall
DoS (Denial-of-service)
RESTCONF
Check Enable to prevent DoS attacks. DoS prevents Ping of Death, SYN Flood Detect
Rate [max/sec], IP Spoofing, Echo Storm, ICMP Flood, UDP Flood, and TCP Flood
attacks.
Note
Check Enable to block the ICMP echo requests to WAN.Block WAN Request
By default, it is enabled on LAN interface. It can also be enabled on both LAN and WAN
interfaces.
By default, the port is 443 and is configurable.RESTCONF Port
The traffic rate for SYN Flood, Echo Storm, ICMP Flood are configurable.
The default values are: 128,15, and 100 respectively.
By default, it is enabled on LAN interface. It can also be enabled on both LAN and WAN
interfaces
By default, port is 830 and it can be configurable.NETCONF Port
Enables the members of the LAN interface to connect to the device either through HTTP
or HTTPs. HTTPs is enabled by default and can not be disabled. You can add or remove
HTTP. Select HTTP or HTTPS.
To log remotely to the web interface via the WAN. Check Enable to enable remote web
management and enter the Port (Default 443, Range 1025-65535).
• Select HTTP or HTTPS.
Check Any IP Address or enter a range of IP addresses for remote access.AllowedRemote IP Address
Check Enable to allow SIP ALG. This embeds messages of the SIP passing through a
configured device with Network Address Translation (NAT) to be translated and encoded
back to the packet. This application-layer gateway (ALG) is used with NAT to translate
the SIP or Session Description Protocol (SDP) messages.
Enter the port number. The default value is 21. FTP ALG port translates the FTP packets.FTP ALG Port
A set of networking protocols that permits network devices to seamlessly discover each
other's presence on the network and establish functional network services for data sharing
and communications. Check Enableto enable universal plug and play.
Check to restrict the following web features:
• Java: Blocks Web Java feature.
• Cookies: Blocks cookies.
• ActiveX: Blocks ActiveX.
• Access to HTTP Proxy Server: Blocks HTTP proxy servers.
Exception
Step 2In the Trusted Domains Table, check Domain Name to edit the existing domain settings.
Step 3Click Add, Edit or Delete to add, edit or delete a domain.
Step 4Click Apply.
Check Enable to allow only the selected web features such as Java, Cookies, ActiveX,
or Access to HTTP Proxy Servers and restrict all others.
Access Rules
Rules can be configured for filtering the packets based on particular parameters like IP address or ports. To
configure the access rules, follow these steps:
Step 1Select Firewall > Access Rules. In the IPv4 orIPv6 Access Rules Table, enter the following information:
Step 2Click Add or select the row and click Edit and enter the following:
RV340x Administration Guide
74
Firewall
Access Rules
Check Enable to enable the specific access rule. Uncheck to disable.RuleStatus
Action
Services
Log
Source Address
Choose Allows or Denies from the drop-down list. This will either permit or discard the
following traffic.
• IPv4 – Select the service to apply IPv4 rule.
• IPv6 – Select the service to apply IPv6 rule.
• Services – Select the service from the drop-down list.
Select True or Never from the drop-down list.
• True – Matches the rules.
• Never – No log required.
Select the source interface from the drop-down list.Source Interface
Select the source IP address to which the rule is applied and enter the following:
• Any
• Single IP – Enter an IP address.
• IP Range – Enter the range of IP addresses.
• Subnet – Enter a subnet of a network.
Select the source interface from the drop-down list.Destination Interface
Destination Address
Select the source IP address to which the rule is applied and enter the following:
• Any
• Single IP – Enter an IP address.
• IP Range – Enter the range of IP addresses.
• Subnet – Enter a subnet of a network.
Schedule Name
Select Business,Evening hours, Marketing,or Workfrom the drop-down list to apply
the firewall rule. Then, click on the link to configure the schedules.
Step 3Click Apply.
Step 4Click Restore to Default Rules, to restore the default rules.
Step 5Click Service Management to configure the services.
Step 6To add a service, click Add. To edit or delete a service, select the row and click Edit or Delete.
Step 7In the Service Table, you can configure the following:
• Application Name – Name of the service or application.
• Protocol – Required protocol. Refer to the documentation for the service that you are hosting.
• Port Start/ICMPType/IP Protocol – Range of port numbers reserved for this service.
• Port End– Last number of the port, reserved for this service.
RV340x Administration Guide
75
Network Address Translation
Step 8Click Apply.
Network Address Translation
Network address translation (NAT) enables private IP networks with unregistered IP addresses to connect to
the network. NAT translates the private addresses of the internal network to public addresses before packets
are forwarded to the public network.
To configure NAT, follow these steps:
Step 1Click Firewall > Network Address Translation.
Step 2In the NATTable, check Enable NATfor each interface on the Interface list to enable.
Step 3Click Apply.
Firewall
Static NAT
Static NAT is used to protect the LAN devices from discovery and attack. Static NAT creates a relationship
that maps a valid WAN IP address to LAN IP addresses that are hidden from the WAN (Internet) by NAT.
Step 1Click Firewall > Static NAT.
Step 2Click Add (or select the row and click Edit) and enter the information.
Check to enable the Static NAT.Enable
Enter the starting IP address of the internal IP address range to map to the public range.Private IP Range Begin
Public IP Range Begin
Range Length
Step 3Click Service Management.
Step 4To add a service, click Add under the Service table. To edit or delete a service, select the row and click Edit or Delete.
The fields open for modification.
Step 5Configure the following services:
Enter the starting IP address of the public IP address range provided by ISP.
Note
Enter the number of IP addresses in the range.
Note
Select the name of the service, from the drop-down list, to apply for the Static NAT.Services
Select the name of the interface from the drop-down list.Interfaces
Do not include the device WAN IP address in this range.
The range length must not exceed the number of valid IP addresses. To map
a single address, enter 1.
• Application Name – Name of the service or application.
RV340x Administration Guide
76
Firewall
• Protocol – Enter the protocol.
• Port Start/ICMPType/IP Protocol – Enter a range of port numbers reserved for this service.
• Port End– Enter the last number of the port, reserved for this service.
Step 6Click Apply.
Port Forwarding
Port forwarding allows public access to services on network devices on the LAN by opening a specific port
or port range for a service, such as FTP. Port forwarding opens a port range for services such as Internet
gaming that uses alternate ports to communicate between the server and the LAN host.
To configure the port forwarding, follow these steps:
Port Forwarding
Step 1Click Firewall > Port Forwarding.
Step 2In the Port Forwarding Table, click Add or select the row and click Edit) and configure the following:
Check to enable port forwarding.Enable
External Service
Internal Service
Step 3Click Service Management.
Step 4In the Service Table, click Add or select a row and click Edit and configure the following:
• Application Name – Name of the service or application.
• Protocol – Required protocol. Refer to the documentation for the service that you are hosting.
• Port Start/ICMPType/IP Protocol – Range of port numbers reserved for this service.
• Port End– Last number of the port, reserved for this service.
Step 5Click Apply.
Select an external service from the drop-down list. (If a service is not listed, you can add
or modify the list by following the instructions in the Service Management section.)
Select an internal service from the drop-down list. (If a service is not listed, you can add
or modify the list by following the instructions in the Service Management section.)
Enter the internal IP addresses of the server.Internal IP Address
Select the interface from the drop-down list, to apply port forwarding on.Interfaces
Note
Step 6In the UPnP Port Forwarding Table, click Refresh to refresh the UPnP listing.
The port forwarding rules for UPnP are dynamically added by the UPnP application.
RV340x Administration Guide
77
Port Triggering
Port Triggering
Port triggering allows a specified port or port range to open for inbound traffic after user sends outbound
traffic through the trigger port. Port triggering allows the device to monitor outgoing data for specific port
numbers. The device recalls the client’s IP address that sent the matching data. When the requested data returns
through the device, the data is sent to the proper client using the IP addressing and port mapping rules.
To add or edit a service to the port triggering table, configure the following:
Step 1Click Add (or select the row and click Edit) and enter the information:
Check to enable the port triggering rule.Enable
Enter the name of the application.Application Name
Firewall
Trigger Service
Incoming Service
Step 2Click Service Management, to add or edit an entry on the Service list.
Step 3In the Service Table, click Add or Edit and configure the following:
• Application Name – Name of the service or application.
• Protocol – Required protocol. Refer to the documentation for the service that you are hosting.
• Port Start/ICMPType/IP Protocol – Range of port numbers reserved for this service.
• Port End– Last number of the port, reserved for this service.
Step 4Click Apply.
Select a service from the drop-down list. (If a service is not listed, you can add or modify
the list by following the instructions in the Service Management section.)
Select a service from the drop-down list. (If a service is not listed, you can add or modify
the list by following the instructions in the Service Management section.)
Select the interface from the drop-down list.Interfaces
Session Timeout
With the session timeout feature, you can configure the session time-out and maximum concurrent connections
for TCP/UDP/ICMP flows. The session timeout is the time it takes for the TCP or UDP session to time out
after a period of idleness.
To configure the Session Timeout, follow these steps:
Step 1Click Firewall > Session Timeout.
Step 2Enter the following:
TCP Session Timeout
RV340x Administration Guide
78
Enter the timeout value in seconds for TCP sessions. Inactive TCP sessions are removed
from the session table after this duration.
Firewall
DMZ Host
UDP Session Timeout
ICMP Session Timeout
Connection
Step 3Click Apply.
DMZ Host
Enter the timeout value in seconds for UDP sessions. Inactive UDP sessions are removed
from the session table after this duration.
Enter the timeout value in seconds for ICMP sessions. Inactive ICMP sessions are
removed from the session table after this duration.
Enter the maximum number of concurrent connections allowed.Maximum Concurrent
Displays the number of current connections.Current Connections
Click to clear the current connections.Clear Connections
DMZ is a subnetwork that is open to the public but behind the firewall. With DMZ, the packets, which enter
the WAN port, can be redirected to a specific IP address on the LAN.
DMZ Host allows one host on the LAN to be exposed to the Internet to use services such as Internet gaming,
video conferencing, web, or email servers. Access to the DMZ Host from the Internet can be restricted by
using firewall access rules. We recommend that you place hosts that must be exposed to the WAN for services
in the DMZ network.
This section describes a Virtual Private Network (VPN), which is used to establish an encrypted connection
over a less secure network. Virtual private networks ensure secure connections to an underlying network
infrastructure. A tunnel establishes a private network that can send data securely using encryption and
authentication. This section contains the following topics:
• VPN Status, on page 81
• IPSec Profiles, on page 83
• Site-to-Site, on page 86
• Client to Site, on page 89
• Teleworker VPN Client, on page 92
• PPTP Server, on page 93
• L2TP Server, on page 94
• GRE Tunnel, on page 95
• SSL VPN, on page 95
• VPN Passthrough, on page 98
VPN Status
A Virtual Private Network (VPN) is used to establish an encrypted connection over a less secure network.
VPN ensures the appropriate level of security to the connected systems when the underlying network
infrastructure alone cannot provide it. A tunnel will be established a private network that can send data securely
by using industry-standard encryption and authentication techniques to secure the data sent.
A remote-access VPN usually relies on either IPSec or SSL to secure the connection. VPNs provide Layer 2
access to the target network; these require a tunneling protocol such as PPTP or L2TP running across the base
IPSec connection. The IPSec VPN supports site-to-site VPN for a gateway-to-gateway tunnel and
client-to-server VPN for host-to-gateway tunnel. For example, a user can configure a VPN tunnel at a branch-site
to connect to the device at corporate-site, so that the branch-site can securely access corporate network. The
client to server VPN is useful when connecting from Laptop/PC from home to a corporate network through
VPN server.
The VPN Status displays the tunnel status of the Site-to-Site, Client-to-Site, SSL VPN, PPTP, L2TP, and
Teleworker VPN Client. To view the device’s VPN status, click Status > VPN Status.
Site-to-Site Tunnel Status
• Tunnel(s) Used – VPN tunnels in use.
RV340x Administration Guide
81
VPN Status
VPN
• Tunnel(s) Available – Available VPN tunnels.
• Tunnel(s) Enabled – VPN tunnels enabled.
• Tunnel(s) Defined – Defined VPN tunnels.
In the Connection Table, you can add, edit, delete, or refresh a site-to-site tunnel. (See Site-to-Site, on page
86). You can also click on Column DisplaySelection to select the column headers displayed in the Connection
Table.
Client-to-Site Tunnel Status
In this mode, a remote client from an external network connects to the server to access the corporate
network/LAN behind the server. For a secure connection, you can implement a client-to-site VPN. You can
view all the Client-to-Tunnel connections, add, edit, or delete the connections in the Connection Table. (See
Client to Site, on page 89).
The Connection Table displays the following:
• Group orTunnel Name – Name of the VPN tunnel. This is for reference purposes only and does not
match the name used at the other end of the tunnel.
• Connections – Number of connected clients.
• Phase2 Encryption/Auth/Group – Phase 2 encryption type
(NULL/DES/3DES/AES-128/AES-192/AES-256), authentication method (NULL/MD5/SHA1), and
DH group number (1/2/5).
• Local Group– IP address and subnet mask of the local group.
SSL VPN Status
A Secure Sockets Layer virtual private network (SSLVPN) allows users to establish a secure, remote-access
VPN tunnel to this device by using a web browser. SSL VPN provides secure, easy access to a broad range
of web resources and web-enabled applications from almost any computer on the Internet. Here, you can view
the status of the SSL VPN tunnels.
• Tunnel(s) Used – SSL VPN Tunnels used for connection.
• Tunnel(s) available – Available tunnels for the SSL VPN connection.
The Connection Tableshows the status of the established tunnels. You can also add edit or delete connections
and check the traffic statistics for the connection.
• Policy Name– Name of the policy applied on the tunnel.
• Session – Number of sessions.
You can also add, edit or delete a SSL VPN. (See SSL VPN, on page 95).
PPTP Tunnel Status
Point-to-Point Tunneling Protocol has the capability to encrypt data with 128-bit. It is used to ensure that
messages sent from one VPN node to another are secure.
• Tunnel(s) Used – PPTP Tunnels used for the VPN connection.
RV340x Administration Guide
82
VPN
IPSec Profiles
• Tunnel(s) Available – Available tunnels for the PPTP connection.
The Connection Table – shows the status of the established tunnels. You can also connect or disconnect
these connections.
• Session ID – Session ID of the proposed or current connection.
• Username – Name of the connected user.
• Remote Access – IP address of the remotely connected or proposed connection.
• Tunnel IP – IP address of the tunnel.
• Connect Time– For how long the tunnel is connected.
• Action – Connect or disconnect the tunnel.
L2TP Tunnel Status
Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions by using the Internet at Layer
2. You can find the status of L2TP Tunnel Status.
• Tunnel(s) used – L2TP tunnels used for the VPN connection.
• Tunnel(s) available – Available tunnels for the L2TP connection.
The Connection Table – Shows the status of the established tunnels. You can also connect or disconnect
these connections.
• Session ID – Session ID of the proposed or current connection.
• Username – Name of the connected user.
• Remote Access – IP address of the remotely connected or proposed connection.
• Tunnel IP – IP address of the tunnel.
• Connect Time– For how long the tunnel is connected.
• Action – Connect or disconnect the tunnel.
IPSec Profiles
The IPSec profiles contain information related to the algorithms such as encryption, authentication, and DH
group for Phase I and II negotiations in auto mode. These profiles also contain keys for corresponding
algorithms in case keying mode is manual. The IPSec profiles are referred in any of IPSec VPN records like
site-to-site, client-to-site, or Teleworker VPN client
To configure the IPSec Profiles, follow these steps:
Step 1Select VPN > IPSec Profiles.
Step 2In the IPSec Profiles Table, click Add to add a new IPSec profile or select an existing IPsec Profile an click Edit to
modify.
Step 3Under Add a New IPSec Profile, enter a name in the Profile Name section.
RV340x Administration Guide
83
VPN
IPSec Profiles
Step 4Select the keying mode and IKE version. The Internet Key Exchange (IKE) is a protocol that is used to set up a security
association in the IPSec protocol suite. IPSec is an IP security feature that provides robust authentication and encryption
of IP packets. IPsec can be configured without IKE, but IKE enhances IPsec by providing additional features, flexibility,
and ease of configuration for the IPsec standard. IKE is a hybrid protocol, that implements the Oakley key exchange and
Skeme key exchange inside the Internet Security Association Key Management Protocol (ISAKMP) framework. (ISAKMP,
Oakley, and Skeme are security protocols implemented by IKE.)
The differences between IKEv1 and IKEv2 are as follows:
• IKEv2 does not consume as much bandwidth as IKEv1.
• IKEv2 supports EAP authentication while IKEv1 doesn’t.
• IKEv2 supports MOBIKE while IKEv1 doesn’t.
• IKEv2 has built-in NAT traversal while IKEv1 doesn’t.
• IKEv2 can detect whether a tunnel is still alive while IKEv1 cannot.
Step 5For Auto Keying Mode, configure the following:
Phase 1 Options
Diffie-Hellman(DH) Group
Encryption
Authentication
SA Lifetime (Sec)
Phase 2 Options
Protocol Selection
Select a DH group (Group2 or Group5) from the drop-down list. DH is a key exchange
protocol, with two groups of different prime key lengths: Group 2 has up to 1,024 bits,
and Group 5 has up to 1,536 bits.
For faster speed and lower security, choose Group 2. For slower speed and higher security,
choose Group 5. Group 2 is selected by default.
Select an encryption option (3DES, AES-128, AES-192, or AES-256) from the
drop-down list. This method determines the algorithm used to encrypt or decrypt
ESP/ISAKMP packets.
The authentication method determines how the Encapsulating Security Payload Protocol
(ESP) header packets are validated. The MD5 is a one-way hashing algorithm that
produces a 128-bit digest. The SHA1 is a one-way hashing algorithm that produces a
160-bit digest. The SHA1 is recommended because it is more secure. Make sure that
both ends of the VPN tunnel use the same authentication method. Select an authentication
(MD5, SHA1 or SHA2-256).
Amount of time an IKE SA is active in this phase. The default value for Phase 1 is 28,800
seconds.
Select a protocol from the drop-down list.
• ESP: Select ESP for data encryption and enter the encryption.
Encryption
84
• AH: Select this for data integrity in situations where data is not secret but must be
authenticated.
Select an encryption option (3DES, AES-128, AES-192, or AES-256) from the
drop-down list. This method determines the algorithm used to encrypt or decrypt
ESP/ISAKMP packets.
RV340x Administration Guide
VPN
IPSec Profiles
Select an authentication (MD5,SHA1 or SHA2-256).Authentication
SA Lifetime (Sec)
Amount of time a VPN tunnel (IPSec SA) is active in this phase. The default value for
Phase 2 is 3600 seconds.
Perfect Forward Secrecy
(PFS)
Check Enable to enable PFS and enter the lifetime in seconds, or uncheck Enable to
disable.
When the PFS is enabled, the IKE Phase 2 negotiation generates a new key for the IPSec
traffic encryption and authentication. Enabling this feature is recommended.
Diffie-Hellman(DH) Group
Select a DH group (Group2 or Group5) from the drop-down list. DH is a key exchange
protocol, with two groups of different prime key lengths: Group 2 has up to 1,024 bits,
and Group 5 has up to 1,536 bits.
For faster speed and lower security, choose Group 2. For slower speed and higher security,
choose Group 5. Group 2 is selected by default.
Step 6For Manual Keying Mode, configure the following:
IPsec Configurations
Security Parameter Index
(SPI) Incoming
Enter a number (Range 100 - FFFFFFFF, Default 100).
The SPI is an identification tag added to the header while using IPsec for tunneling the
IP traffic. This tag helps the kernel discern between the two traffic streams where different
encryption rules and algorithms may be in use.
Enter a number (Range 100 - FFFFFFFF, Default 100).SPI Outgoing
Encryption
Select an encryption option (3DES, AES-128, AES-192, or AES-256) from the
drop-down list. This method determines the algorithm used to encrypt or decrypt
ESP/ISAKMP packets.
Key-In
Enter a number (Hex, 48 characters). Key for decrypting ESP packets received in hex
format.
Enter a number (Hex, 48 characters). Key for encrypting the plain packets in hex format.Key-Out
Authentication
The authentication method determines how the Encapsulating Security Payload Protocol
(ESP) header packets are validated. The MD5 is a one-way hashing algorithm that
produces a 128-bit digest. The SHA1 is a one-way hashing algorithm that produces a
160-bit digest. The SHA1 is recommended because it is more secure. Make sure that
both ends of the VPN tunnel use the same authentication method. Select an authentication
(MD5, SHA1 or SHA2-256).
Key-In
Enter a number (Hex, 32 characters). Key for decrypting ESP packets received in hex
format.
Enter a number (Hex, 32 characters). Key for encrypting the plain packets in hex format.Key-Out
Step 7Select an IPsec profile and click Edit or Delete.
Step 8To clone an exiting profile, select a profile and click Clone.
Step 9Click Apply.
RV340x Administration Guide
85
Site-to-Site
Site-to-Site
VPN
In a site-to-site VPN, the local device at one location connects to a remote device through a VPN tunnel.
Client devices can access network resources as if they were all at the same site. This model can be used for
multiple users at a remote location.
A successful connection requires that at least one of the devices to be identifiable by a static IP address or a
Dynamic DNS hostname. If one device has only a dynamic IP address, you can use any email address (user
FQDN) or FQDN as an identification to establish the connection.
The two LAN subnets on either side of the tunnel cannot be on the same network. For example, if the Site A
LAN uses the 192.168.1.x/24 subnet, Site B can use 192.168.2.x/24.
To configure a tunnel, enter corresponding settings (reversing local and remote) when configuring the two
devices. Assume that this device is identified as device A. Enter its settings in the Local Group Setup section;
enter the settings for the other device (device B) in the Remote Group Setup section. When you configure the
other device (device B), enter its settings in the Local Group Setup section, and enter the device A settings in
the Remote Group Setup section.
To add and configure a Site-to-Site VPN, follow these steps:
Step 1Click VPN > Site-to-Site.
Step 2In the Site to Site table, click Add, and configure the following:
Enable
Connection Name
Remote Endpoint
Step 3In the IKE Authentication Method section, complete the following:
Pre-shared Key
The name of the VPN tunnel connection created using VPN Setup Wizard. It does not
have to match the name used at the other end of the tunnel.
The name of the VPN tunnel connection created using VPN Setup Wizard. It does not
have to match the name used at the other end of the tunnel.
IPSec profile used for the VPN tunnel.IPSec Profile
Interface used for the tunnel.Interface
IP address of the remote endpoint to whee the VPN connection is intended. This can be
a FQDN or an IP address.
IKE peers authenticate each other by computing and sending
a keyed hash of data that includes the Pre-shared Key. If
the receiving peer is able to create the same hash
independently using its Pre-shared key, it knows that both
peers must share the same secret, thus authenticating the
other peer. Pre-shared keys do not scale well because each
IPSec peer must be configured with the Pre-shared key of
every other peer with which it establishes a session. Enter
the Pre-shared Key, and click Enable to enable the Minimum
Pre-shared Key Complexity. To display the Pre-shared key,
check Enable in the Show Pre-shared key section.
RV340x Administration Guide
86
VPN
Site-to-Site
Certificate
Step 4In the Remote Group Setup section, complete the following:
Step 5On the Advanced Settings tab, provide the following:
Check the box to enable aggressive mode.Aggressive Mode
Check to enable the certificate. The digital certificate is a
package that contains information such as a certificate
bearer's identity: name or IP address, the certificate's serial
number, the certificate's expiration date, and a copy of the
certificate bearer's public key. The standard digital
certificate format is defined in the X.509 specification.
X.509 version 3 defines the data structure for certificates.
Select the local certificate from the drop-down list.Local Certificate
Select the remote CA certificate from the drop-down list.Remote CA Certificate
Select the remote identifier type from the drop-down list.Remote Identifier Type
Enter the name of the remote identifier.Remote Identifier
Select the remote IP type from the drop-down list.Remote IP Type
Enter the IP address.IP address
Enter the subnet mask.Subnet Mask
Compress (Support IP
Payload Compression
Protocol)
NetBIOS Broadcast
Keep-Alive Monitoring
Interval
A protocol that reduces the size of IP datagrams. Check Compressto enable the router
to propose compression when it starts a connection. If the responder rejects this proposal,
then the router does not implement compression. When the router is the responder, it
accepts compression, even if compression is not enabled. If you enable this feature for
this router, also enable it on the router at the other end of the tunnel.
Broadcast messages used for name resolution in Windows networking to identify resources
such as computers, printers, and file servers. These messages are used by some software
applications and Windows features such as Network Neighborhood. LAN broadcast
traffic is typically not forwarded over a VPN tunnel. However, you can check this box
to allow NetBIOS broadcasts from one end of the tunnel to be rebroadcast to the other
end.
Attempts to re-establish the VPN connection in regular intervals of time.Keep-Alive
Enter the number of seconds to set the keepalive monitoring interval. (Range is 10-999
seconds - Default is 10).
RV340x Administration Guide
87
Site-to-Site
VPN
Dead Peer Detection (DPD)
Enable
Extended Authentication
Split DNS
Check DPD Enabled to enable DPD. It sends periodic HELLO/ACK messages to check
the status of the VPN tunnel. DPD option must be enabled on both ends of the VPN
tunnel. Specify the interval between HELLO/ACK messages in the Interval field by
entering the following:
• Delay Time: Enter the time delay between each Hello message. (Range is 10 - 300
sec)
• Detection Timeout: Enter the timeout to declare that the peer is dead. (Range is
30 - 1800 sec).
• DPD Action: Action to be taken after DPD timeout. Select Clearor Restartfrom
the drop-down list.
Check Extended Authentication to enable.
For a single user, select Userand enter the username and password.
For a group, select Group Name, and select admin or guest from the drop-down list.
Check Split DNS to enable.
Splits the DNS server and other DNS requests to another DNS server, based on specified
domain names. When the router receives an address resolution request, it inspects the
domain name. If the domain name matches a domain name in the Split DNS settings, it
passes the request to the specified DNS server. Otherwise, the request is passed to the
DNS server that is specified in the WAN interface settings.
DNS Server 1 and DNS Server 2 – Enter the IP address of the DNS server to use for
the specified domains. Optionally, specify a secondary DNS server in the DNS Server
2 field.
Domain Name 1 to 6 – Enter the domain names for the DNS servers. Requests for the
domains are passed to the specified DNS server.
Step 6To enable the Site-to-Site Failover, the Keepalive must be enabled on the Advanced Settings tab. Next, on the Failover
tab, provide the following information:
Tunnel Backup
Check Tunnel Backup to enable. When the primary tunnel is down, this feature enables
the router to re-establish the VPN tunnel by using either an alternate IP address for the
remote peer or an alternate local WAN. This feature is available only if DPD is enabled.
Remote Backup IP Address
Enter the IP address for the remote peer, or reenter the WAN IP address that was already
set for the remote gateway.
Select the local interface (WAN1,WAN2, USB1, or USB2) from the drop-down list.Local Interface
Step 7Click Apply.
RV340x Administration Guide
88
VPN
Client to Site
Clients from the Internet can connect to the server to access the corporate network or a LAN behind the server.
This feature creates a new VPN tunnel to allow teleworkers and business travelers to access your network by
using third-party VPN client software.
To open the Client-to-Site page, click VPN > Client-to-Site and the follow will be displayed:
Name of the connected tunnel.Tunnel Name
Name of the interface with which the groups are connected.WAN Interface
Name of the authentication method through which they are connected.Authentication Method
Adding a Client-to-Site Connection
Step 1Click Add and, select an option (Cisco VPN Client or 3rdParty Client).
Step 2For Cisco VPN Client, configure the following:
Client to Site
IKEAuthentication Method
Click Enable to enable the configuration.Enable
Enter a name for the group.Group Name
Select the interface (WAN1, WAN2, USB1, orUSB2) from the drop-down list.Interface
Authentication method to be used in IKE negotiations in IKE-based tunnels.
• Pre-shared Key: IKE peers authenticate each other by computing and sending a
keyed hash of data that includes the Pre-shared Key. If the receiving peer is able to
create the same hash independently using its Pre-shared key, it knows that both
peers must share the same secret, thus authenticating the other peer. Pre-shared keys
do not scale well because each IPSec peer must be configured with the Pre-shared
key of every other peer with which it establishes a session. Enter the Pre-shared
Key, and click Enable to enable the Minimum Pre-shared Key Complexity. To
display the Pre-shared key, check Enable in the Show Pre-shared key section.
• Certificate: The digital certificate is a package that contains information such as a
certificate bearer's identity: name or IP address, the certificate's serial number, the
certificate's expiration date, and a copy of the certificate bearer's public key. The
standard digital certificate format is defined in the X.509 specification. X.509 version
3 defines the data structure for certificates. Select the certificate from the drop-down
list.
Click Add to add a user group. (Click Delete to delete a user group.User Group
RV340x Administration Guide
89
Client to Site
VPN
Mode
Pool Range for Client LAN
For Mode Configuration
Name Service (WINS)
Server
Select the mode from the options.
• Client – Client request for IP address and server supplies the IP addresses from the
configured address range. Select Client and enter the start and end IP addresses for
client’s LAN.
• Network Extension Mode (NEM) – Clients propose their subnet for which VPN
services need to be applied on traffic between LAN behind server and subnet
proposed by client.
Start IP– Enter the start IP address for the pool range.EndIP - Enter the end IP address
for the pool range. The Remote client will be assigned an IP from this pool upon
connection.
Enter the IP address of the primary DNS server.Primary DNS
Enter the IP address of the secondary DNS server.Secondary DNS
Enter the IP address of the primary WINS.Primary Windows Internet
Enter the IP address of the secondary WINS.Secondary WINS Server
Enter the name of the default domain to be used in remote network.Default Domain
Backup Server 1, 2, & 3
Enter the IP address or domain name of the back servers 1, 2 and 3. When the connection
to the primary IPSec VPN server fails, the security appliance can start the VPN connection
to the backup servers. The backup server 1 has the highest priority and the backup server
3 has the lowest priority.
Split Tunnel
Check to enable split tunnel. Then click Add, to enter an IP address and netmask for the
split tunnel. You can add, edit, or delete a split tunnel.
Split DNS
Check Enable to enable the Split DNS. Then click Add, to enter an domain name for
the split DNS. You can add, edit, or delete a split tunnel.
For a 3rd Party Client
Step 3In the Basic Settings tab, configure the following:
Click Enable to enable the configuration.Enable
Tunnel Name
Name of the VPN tunnel. This description is for your reference. It does not have to match
the name used at the other end of the tunnel
Select the interface (WAN1, WAN2, USB1, or USB2) from the drop-down list.Interface
RV340x Administration Guide
90
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.