While reading through the User Guide you may see
various icons that call attention to specific items. Below is
a description of these icons:
NOTE: This check mark indicates that there is
a note of interest and is something that you
should pay special attention to while using the
product.
WARNING: This exclamation point indicates
that there is a caution or warning and it is
something that could damage your property or
product.
WEB: This globe icon indicates a noteworthy
website address or e-mail address.
Open Source
This product may contain material licensed to you under
the GNU General Public License or other open-source
software licenses. Upon request, open-source software
source code is available at cost from Linksys for at least
three years from the product purchase date.
WEB: For detailed license terms and additional
information visit: www.linksys.com/gpl
Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.
ResourceWebsite
Linksyswww.linksys.com
Linksys International www.linksys.com/international
Thank you for choosing the Linksys 4-Port SSL/IPSec
VPN Router. The Router is an advanced Internet-sharing
network solution for your small business needs. Like any
router, it lets multiple computers in your office share an
Internet connection. It features a built-in, 4-port, fullduplex, 10/100 Ethernet switch to connect four computers
directly, or you can connect more switches to create as
big a network as you need. If you have multiple routers in
your Local Area Network (LAN), you can use the Router’s
multiple subnet feature to support those routers.
The five Secure Sockets Layer (SSL) Virtual Private
Network (VPN) tunnels gives your mobile workers a
secure and easy way to stay connected. Additionally, an
IPSec (Internet Protocol Security), gateway-to-gateway
VPN tunnel facilitates branch office connectivity. As an
essential element of your business, the Router provides
security functions for authentication, encryption, and
firewall. Additional security features includes Denial of
Service (DoS) prevention and HTTPS management, while
the Quality of Service (QoS) features provide consistent
voice and video quality throughout your business.
Use the browser-based utility to configure settings and
run convenient wizards that will help you set up the
Router and its access rules.
Introduction to Virtual Private Networks
(VPNs)
A VPN is a connection between two endpoints—a VPN
Router, for instance—in different networks that allows
private data to be sent securely over a shared or public
network, such as the Internet. This establishes a private
network that can send data securely between these two
locations or networks.
VPN Router supports two of the most popular VPN tunnel
types, SSL and IPSec.
There are two basic ways to create a VPN connection:
VPN Router to VPN Router
•
computer (using SSL VPN client software) to
•
VPN Router
NOTE: The 4-Port SSL/IPSec VPN Router does
not support IPSec VPN client software.
The VPN Router creates a “tunnel” or channel between two
endpoints, so that data transmissions between them are
secure. A computer with SSL or IPSec VPN client software
can be one of the two endpoints.
For an IPSec VPN tunnel, any computer with the built-in
IPSec Security Manager (Windows 2000 and XP) allows the
VPN Router to create a VPN tunnel using IPSec (Windows
Vista uses a similar utility). Other Windows operating
systems require additional, third-party VPN client software
applications that support IPSec to be installed.
For an SSL VPN tunnel, a computer can download the
Virtual Passage SSL VPN client software during first-time
connection to the SSL VPN Portal. (See “Appendix B: Virtual
Passage SSL VPN Client.”)
VPN Router to VPN Router
An example of a VPN Router-to-VPN Router VPN would
be as follows. At home, a telecommuter uses his VPN
Router for his always-on Internet connection. His Router
is configured with his office’s VPN settings. When he
connects to his office’s router, the two routers create a VPN
tunnel, encrypting and decrypting data. As VPNs utilize
the Internet, distance is not a factor. Using the VPN, the
telecommuter now has a secure connection to the central
office’s network, as if he were physically connected.
The private network is established by creating a “tunnel”. A
VPN tunnel connects the two computers or networks and
allows data to be transmitted over the Internet as if it were
still within those networks. A VPN tunnel uses industrystandard encryption and authentication techniques to
secure the data sent between the two networks.
Virtual Private Networking was created as a cost-effective
alternative to using a private, dedicated, leased line for a
private network. It can be used to create secure networks
linking a central office with branch offices, telecommuters,
and/or professionals on the road. The 4-Port SSL/IPSec
4-Port SSL/IPSec VPN Router
1
Chapter 1
Introduction
Home
VPN Router
VPN Router
VPN Router to VPN Router
Internet
Central Office
Computer (using SSL VPN client software) to
VPN Router
For additional information and instructions about
creating your own VPN, visit the Linksys website at
www.linksys.com.
The following is an example of a computer-to-VPN Router
VPN. In her hotel room, a traveling businesswoman
connects to her Internet Service Provider (ISP). Her
notebook computer has VPN client software that is
configured with her office’s VPN settings. She accesses the
VPN client software and connects to the VPN Router at the
central office. As VPNs utilize the Internet, distance is not
a factor. Using the VPN, the businesswoman now has a
secure connection to the central office’s network, as if she
were physically connected.
Off-Site
Internet
Notebook with VPN
Client Software
VPN
Router
Central Office
Computer to VPN Router
4-Port SSL/IPSec VPN Router
2
Chapter 2
Product Overview
Chapter 2:
Product Overview
Front Panel
Power (Green) The Power LED lights up green
and stays on while the Router is powered on.
Diag (Orange) The Diag LED lights up when
the Router is not ready for use. During a warm
reset, it flashes slowly. During a reset to factory
defaults, it flashes quickly. The LED turns off
when the Router is ready for use.
Internet (Green) The Internet LED lights up
and stays on when there is a connection made
through the Internet port. It flashes to indicate
network activity over the Internet port.
Ethernet 1-4 (Green) These numbered LEDs,
corresponding with the numbered ports on the
Router’s back panel, serve two purposes. If the
LED is solidly lit, the Router is connected to a
device through that port. It flashes to indicate
network activity over that port.
Back Panel
Reset The Reset button can be used in one
of two ways, warm reset and reset to factory
defaults.
Warm Reset If the Router is having problems
•
connecting to the Internet, press and hold in
the Reset button for four seconds using the
tip of a pen. This is similar to pressing the
power button on your computer to reboot
it. The Diag LED will flash slowly during a
warm reset.
Reset to Factory Defaults If you are
•
experiencing extreme problems with
the Router and have tried all other
troubleshooting measures, press and hold
in the Reset button for ten seconds. This will
restore the factory defaults and clear all of
the Router’s custom settings. The Diag LED
will flash quickly during a reset to factory
defaults.
You can also reset the Router to factory
defaults using the System Management > Factory Defaults screen of the Router’s
web-based utility.
4) connect the Router to wired computers and
other Ethernet network devices.
Power The Power port is where you connect
the power adapter.
3
Chapter 3
64.4 mm
Installation
Chapter 3:
Installation
Physical Installation
There are three ways to place the Router. The first way is to
place it horizontally on a surface, so it sits on its four rubber
feet. The second way is to stand the Router vertically on a
surface. The third way is to mount it on a wall.
Horizontal Placement
The Router has four rubber feet on its bottom panel. Set
the Router on a flat surface near an electrical outlet.
WARNING: Do not place excessive weight
on top of the Router; too much weight could
damage it.
Wall-Mounting Placement
The Router has two wall-mount slots on its bottom. The
distance between the two slots is 64.4 mm (2.535 inches).
Two screws are needed to mount the Router.
Suggested Mounting Hardware
5.0-6.0 mm1.6-2.0 mm
Note: Mounting hardware illustrations are not
†
true to scale.
NOTE: Linksys is not responsible for damages
incurred by insecure wall-mounting hardware.
Follow these instructions:
Determine where you want to mount the Router. Make
1.
sure that the wall you use is smooth, flat, dry, and
sturdy. Also make sure the location is within reach of
an electrical outlet.
3.0-3.8 mm
Vertical Placement
Line up the edges of the Router with the two stands.
1.
Insert the Router into the stands.
2.
Set the Router on a flat surface near an electrical
3.
outlet.
Drill two holes into the wall. Make sure the holes are
2.
64.4 mm (2.535 inches) apart.
Insert a screw into each hole and leave 5 mm
3.
(0.2 inches) of its head exposed.
Maneuver the Router so the wall-mount slots line up
4.
with the two screws.
Place the wall-mount slots over the screws and slide
5.
the Router down until the screws fit snugly into the
wall-mount slots.
Print this page at 100% size. Cut along
the dotted line, and place on the wall
to drill precise spacing.
4-Port SSL/IPSec VPN Router
Wall Mounting Template
4
Chapter 3
Cable Connection
To connect network devices to the Router, follow these
instructions:
Before you begin, make sure that all of your hardware
1.
is powered off, including the Router, computers,
switches, and cable or DSL modem.
Connect your cable or DSL modem’s Ethernet cable to
2.
the Router’s Internet port.
Connect to the Internet Port
Installation
Power on the cable or DSL modem.
3.
Connect one end of an Ethernet network cable to
4.
one of the numbered ports on the back of the Router.
Connect the other end to an Ethernet port on a
network device, such as a computer or switch.
Repeat this step to connect more computers or other
network devices to the Router.
Connect to the Network Device
Connect the included power adapter to the Router’s
5.
Power port, and then plug the power adapter into an
electrical outlet.
Connect the Power
The Power LED on the front panel will light up as soon
6.
as the power adapter is connected properly.
Power on your computers and other network devices.
7.
4-Port SSL/IPSec VPN Router
5
Chapter 4
Chapter 4:
Advanced Configuration
Overview
For your convenience, use the Router’s web-based utility
to set it up and configure it. This chapter will explain all of
the functions in this utility.
These are the main tabs of the utility: System Summary,
Setup, DHCP, System Management, Port Management,
QoS, Firewall, IPSec VPN, SSL VPN, SNMP, Log, Wizard,
Support, and Logout. Additional tabs will be available
after you click one of the main tabs.
Before You Begin
The Router’s web-based utility and SSL VPN Portal
support Internet Explorer 6.0 (or higher) and Netscape
Communicator 8.0 (or higher) running in a Windows
environment.
To configure the SSL VPN software, your web browser must
have SSL, JavaScript, ActiveX, and cookies enabled (these
settings are enabled by default). If the settings are already
enabled, proceed to the next section, “How to Access the
Web-Based Utility”. If the settings are disabled, you should
enable them before configuring the Router. Proceed to
the instructions for your web browser.
Advanced Configuration
Click OK.
6.
Click the Security tab.
7.
Click Custom Level.
8.
Select Enable for Active scripting, Allow paste operations
9.
via script, and Scripting of Java applets.
Internet Explorer > Tools > Internet Options > Security
Click OK.
10.
Click the Privacy tab.
11.
Click Advanced.
12.
Deselect (remove the checkmark from) Override
13.
automatic cookie handling.
Internet Explorer 6.0 or Higher
Open Internet Explorer.
1.
Click Tools.
2.
Click Internet Options.
3.
Click the Advanced tab.
4.
Select Use SSL 2.0 and Use SSL 3.0.
5.
Internet Explorer > Tools > Internet Options > Advanced
Internet Explorer > Tools > Internet Options > Privacy
Click OK.
14.
Click OK again.
15.
Netscape Communicator 8.0 or Higher
Open Netscape Communicator.
1.
Click Tools.
2.
Click Options.
3.
Click Site Controls.
4.
Click the Trust Preferences tab.
5.
In the Master Settings section, click I’m Not Sure.
6.
4-Port SSL/IPSec VPN Router
6
Chapter 4
Select Allow cookies.
7.
Select Enable JavaScript.
8.
Click Advanced.
9.
Select Enable ActiveX.
10.
Netscape Communicator > Options > Site Controls > Web Features
Click OK.
11.
Advanced Configuration
How to Access the Web-Based Utility
For local access of the Router’s web-based utility,
1.
launch your web browser, and enter the Router’s
default IP address, 192.168.1.1, in the Address field.
Press the Enter key.
Address Bar
NOTE: If the Remote Management feature on
the Firewall > General screen has been enabled,
then users with administrative privileges can
remotely access the web-based utility. Use
https://<WAN IP address of the Router>.
A login screen prompts you for your User Name and
2.
Password. Enter admin in the User Name field, and
enter admin in the Password field. (You can change
the Password on the Setup > Password screen.) Then
click Login.
After you have logged in, you will be asked to install
3.
the Web Cache Cleaner application. This will prompt
any user of the Router to delete all temporary
Internet files, cookies, and browser history when the
user logs out or closes the web browser window.
(The ActiveX web cache control will be ignored by
web browsers that do not support ActiveX.)
Click the link to install the Web Cache Cleaner.
4-Port SSL/IPSec VPN Router
7
Chapter 4
Click to Install the Web Cache Cleaner
On the Security Warning screen, click Yes.
4.
Advanced Configuration
Click Yes to Install
The Web Cache Cleaner will be installed in C:\\
5.
WINDOWS\Downloaded Program Files. Proceed to
the rest of this chapter for information about the webbased utility.
When you or another user logs out, a Warning screen
will appear. It will ask you to confirm that you want to
delete the History Item for the Router. Click Yes.
Click Yes to Delete History
System Summary
The first screen that appears is the System Summary
screen, which displays the Router’s current status and
settings. This information is read-only. Underlined text
is hyperlinked to related setup pages, so if you click a
hyperlink, the related setup screen will appear. On the
right-hand side of this screen and all other screens of the
utility is a link to the Site Map, which has links to all of the
utility’s tabs. Click Site Map to view the Site Map. Then,
click the desired tab.
System Summary
Site Map
System Information
Serial Number Displayed here is the serial number of the
Router.
Firmware version Displayed here is the current version
number of the firmware installed on the Router.
CPU Displayed here are the type and speed of the
processor installed on the Router.
DRAM Displayed here is the size of DRAM installed on
the Router’s motherboard.
Flash Displayed here is the size of flash memory installed
on the Router’s board.
4-Port SSL/IPSec VPN Router
8
Chapter 4
Advanced Configuration
System Up Time This is the length of time in days, hours,
and minutes that the Router has been active. The current
time and date are also displayed.
Port Statistics
Click any port on the Router’s rear panel image to see the
status of the selected port. If the port is disabled, it will
be red; if enabled, it will be black. If the port is connected,
it will be green. Information about the selected port will
appear in a separate window.
The port’s Summary table shows the settings of the
selected port, including Type, Interface, Link Status, Port
Activity, Priority, Speed Status, Duplex Status, and Auto
negotiation.
click Renew to update the DHCP Lease Time or get a new
IP address. If the WAN port is set to PPPoE or PPTP, two
buttons, Connect and Disconnect, will be available.
Mode It shows the Router’s Working Mode (Gateway or
Router), and it hyperlinks to the Dynamic Routing section
on the Advanced Routing screen of the Setup tab.
DNS It shows all DNS Server Addresses and hyperlinks to
the WAN Connection Type settings on the Network screen
of the Setup tab.
DDNS It shows the DDNS settings of the Router’s WAN
port and hyperlinks to the DDNS screen of the Setup tab.
DMZ Host It shows the DMZ Private IP Address and
hyperlinks to the DMZ Host screen of the Setup tab. The
default is Disabled.
Firewall Setting Status
SPI (Stateful Packet Inspection) It shows the status
(On/Off) of the SPI setting and hyperlinks to the General
screen of the Firewall tab.
DoS (Denial of Service) It shows the status (On/Off) of
the DoS setting and hyperlinks to the General screen of
the Firewall tab.
Port 1 Information
For the selected port, the statistics table shows this
information: number of packets received, number of
packet bytes received, number of packets transmitted,
number of packet bytes transmitted, and number of
packet errors.
To update the on-screen information, click Refresh. To
exit this screen, click Close.
Network Setting Status
LAN IP It shows the current LAN IP Address of the Router,
as seen by internal users on the network, and it hyperlinks
to the LAN Setting section on the Network screen of the
Setup tab.
WAN IP This shows the current WAN IP address of the
Router, as seen by external users on the Internet and
hyperlinks to the WAN Connection Type settings on the
Network screen of the Setup tab. If the port is set to Obtain
an IP automatically, two buttons, Release and Renew, will
be available. Click Release to release the IP address, and
Block WAN Request It shows the status (On/Off) of the
Block WAN Request setting and hyperlinks to the General
screen of the Firewall tab.
Remote Management It shows the status (On/Off) of
the Remote Management setting and hyperlinks to the
General screen of the Firewall tab.
IPSec VPN Setting Status
IPSec VPN Summary It hyperlinks to the Summary screen
of the IPSec VPN tab.
Tunnel(s) Used It shows the number of VPN tunnels
used.
Tunnel(s) Available It shows the number of VPN tunnels
available.
SSL VPN Setting Status
SSL VPN Summary It hyperlinks to the Summary screen
of the SSL VPN tab.
Tunnel(s) Used It shows the number of VPN tunnels
used.
Tunnel(s) Available It shows the number of VPN tunnels
available.
Log Setting Status
It hyperlinks to the System Log screen of the Log tab.
4-Port SSL/IPSec VPN Router
9
Chapter 4
Advanced Configuration
If you have not set up the e-mail server on the Log tab,
the message, “E-mail cannot be sent because you have
not specified an outbound SMTP server address,” will be
displayed.
If you have set up the mail server but the log has not been
generated due to the Log Queue Length and Log Time
Threshold settings, the message, “E-mail settings have
been configured,” will be displayed.
If you have set up the e-mail server and the log has been
sent to the e-mail server, the message, “E-mail settings
have been configured and sent out normally,” will be
displayed.
If you have set up the e-mail server and the log cannot
be sent to the e-mail server, the message, “E-mail cannot
be sent out, probably use incorrect settings,” will be
displayed.
Setup Tab > Network
The Setup > Network screen shows all of the Router’s basic
setup functions. The Router can be used in most network
setups without changing any of the default values;
however, you may need to enter additional information in
order to connect to the Internet through an ISP (Internet
Service Provider) or broadband (DSL or cable) carrier. The
setup information is provided by your ISP.
LAN Setting
The MAC Address of the Router is displayed.
Device IP Address and Subnet Mask The default values
are 192.168.1.1 for the Router’s local IP address and
255.255.255.0 for the subnet mask.
Multiple Subnet Select this option to enable the Multiple
Subnet feature. Then click Add/Edit to create or modify
subnet(s). A new screen appears.
Create or Modify a Subnet
Setup > Network
Network
Host Name and Domain Name Enter a host and domain
name for the Router. Some ISPs require these names as
identification. You may have to check with your ISP to see
if your broadband Internet service has been configured
with a host and domain name. In most cases, you can
leave these fields blank.
LAN IP Address Enter the LAN IP address.
Subnet Mask Enter the subnet mask.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Network screen.
If you want to modify a subnet you have created, select
it and Make changes.. Click Save Settings to save your
changes, or click Cancel Changes to undo them. Click
Exit to return to the Network screen.
If you want to delete a subnet you have created, select it
and click Delete selected subnet. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Network screen.
WAN Connection Type
WAN
There are four connection types available: Obtain an IP
automatically, Static IP, PPPoE, and PPTP. Depending on
which connection type you select, you will see various
settings.
Obtain an IP Automatically
If your ISP automatically assigns an IP address, select
Obtain an IP automatically. (Most cable modem
4-Port SSL/IPSec VPN Router
10
Chapter 4
Advanced Configuration
subscribers use this connection type.) Your ISP assigns
these values.
Obtain an IP Automatically
DNS Server (Required) 1/2 If you select Use the
Following DNS Server Addresses, enter your DNS server
IP address(es) (enter at least one). Multiple DNS server
IP settings are common. In most cases, the first available
DNS entry is used.
MTU The MTU (Maximum Transmission Unit) setting
specifies the largest packet size permitted for network
transmission. To manually set a value, select Manual and
enter the value desired in the field provided. You should
leave this value in the 1200 to 1500 range, and most DSL
users should use the value 1492. The default is Auto,
which allows the Router to select the best MTU for your
Internet connection.
Default Gateway Address Enter the IP address of the
default gateway.
DNS Server (Required) 1/2 If you select Use the
Following DNS Server Addresses, enter your DNS server
IP address(es) (enter at least one). Multiple DNS server
IP settings are common. In most cases, the first available
DNS entry is used.
MTU The MTU (Maximum Transmission Unit) setting
specifies the largest packet size permitted for network
transmission. To manually set a value, select Manual and
enter the value desired in the field provided. You should
leave this value in the 1200 to 1500 range, and most DSL
users should use the value 1492. The default is Auto,
which allows the Router to select the best MTU for your
Internet connection.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
PPPoE (Point-to-Point Protocol over Ethernet)
Some DSL-based Internet Service Providers (ISPs) use
PPPoE (Point-to-Point Protocol over Ethernet) to establish
Internet connections for end-users. If you use a DSL
line, check with your ISP to see if they use PPPoE, select
PPPoE.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Static IP
If you are required to use a permanent IP address, select
Static IP.
Static IP
Specify WAN IP Address Enter the external IP address of
the Router.
Subnet Mask Enter the subnet mask of the Router.
PPPoE
User Name and Password Enter your account’s User
Name and Password. The maximum number of characters
is 60.
Connect on Demand If you select the Connect on
Demand option, the connection will be disconnected
after a specified period of inactivity (Max Idle Time). If you
have been disconnected due to inactivity, Connect on
Demand enables the Router to automatically re-establish
your connection as soon as you attempt to access the
Internet again. Enter the number of minutes you want to
have elapsed before your Internet access disconnects. The
default Max Idle Time is 5 minutes.
4-Port SSL/IPSec VPN Router
11
Chapter 4
Advanced Configuration
Keep Alive: Interval If you select the Keep Alive option,
the Router will send keep-alive packets as often as you
specify. The default Interval is 30 seconds.
Keep Alive: Retry Times If you select the Keep Alive
option, the Router will send keep-alive packets as many
times as you specify. If the Router does not receive a
response from the ISP, then the Router will terminate the
connection and start sending PADI packets after the Redial
Period. The default Retry Times is 5 times.
Keep Alive: Redial Period If you select the Keep Alive
option, the Router will keep the connection alive by
sending out a few data packets periodically, so your ISP
thinks that the connection is still active. This option keeps
your connection active indefinitely, even when it sits idle.
The default Redial Period is 30 seconds.
MTU The MTU (Maximum Transmission Unit) setting
specifies the largest packet size permitted for network
transmission. To manually set a value, select Manual and
enter the value desired in the field provided. You should
leave this value in the 1200 to 1500 range, and most DSL
users should use the value 1492. The default is Auto,
which allows the Router to select the best MTU for your
Internet connection.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Default Gateway Address Enter the IP address of the
default gateway.
DNS Server (Required) 1/2 If you select Use the
Following DNS Server Addresses, enter your DNS server
IP address(es) (enter at least one). Multiple DNS server
IP settings are common. In most cases, the first available
DNS entry is used.
User Name and Password Enter your account’s User
Name and Password. The maximum number of characters
is 60.
Connect on Demand If you select the Connect on
Demand option, the connection will be disconnected
after a specified period of inactivity (Max Idle Time). If you
have been disconnected due to inactivity, Connect on
Demand enables the Router to automatically re-establish
your connection as soon as you attempt to access the
Internet again. Enter the number of minutes you want to
have elapsed before your Internet access disconnects. The
default Max Idle Time is 5 minutes.
Keep Alive If you select the Keep Alive option, the Router
will keep the connection alive by sending out a few data
packets periodically, so your ISP thinks that the connection
is still active. This option keeps your connection active
indefinitely, even when it sits idle. The default Redial
Period is 30 seconds.
PPTP (Point-to-Point Tunneling Protocol)
Point to Point Tunneling Protocol (PPTP) is a service that
applies to connections in Europe and Israel only.
PPTP
Specify WAN IP Address Enter the external IP address of
the Router.
MTU The MTU (Maximum Transmission Unit) setting
specifies the largest packet size permitted for network
transmission. To manually set a value, select Manual and
enter the value desired in the field provided. You should
leave this value in the 1200 to 1500 range, and most DSL
users should use the value 1492. The default is Auto,
which allows the Router to select the best MTU for your
Internet connection.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Setup > Password
The Router’s default User Name and Password is admin,
and Linksys strongly recommends that you change the
Router’s password from the default to a unique password.
NOTE: The password cannot be recovered if
it is lost or forgotten. If the password is lost or
forgotten, you have to reset the Router to its
factory default settings; this will remove all of
your configuration changes.
Subnet Mask Enter the subnet mask of the Router.
4-Port SSL/IPSec VPN Router
12
Chapter 4
Setup > Password
Password
The User Name is admin; it cannot be changed.
Old Password Enter the old password. The default is
admin when you first power up the Router.
Advanced Configuration
Daylight Saving To use the daylight saving feature, select
Enabled. Enter the Month and Day of the start date, and
then enter the Month and Day of the end date.
NTP Server Enter the URL or IP address of the NTP server.
The default is time.nist.gov.
Manual
New Password Enter a new password for the Router. Your
password must have 20 or fewer characters and cannot
contain any spaces.
Confirm New Password Re-enter the new password to
confirm it.
Click Save Settings to save your change, or click Cancel Changes to undo it.
Setup > Time
The Router uses the time settings to time stamp log events,
automatically apply the Access Rules and Content Filter,
and perform other activities for other internal purposes.
Time
To set the local time, select Set the local time using the
Network Time Protocol (NTP) automatically or Set the
local time Manually.
Automatic
Setup > Time > Manual
Time Zone Select your time zone (the default Time Zone
is Pacific Time).
Hours, Minutes, Seconds Enter the time.
Month, Day, Year Enter the date.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Setup > DMZ Host
The DMZ (Demilitarized Zone) Host feature allows one
local user to be exposed to the Internet for use of a
special-purpose service such as Internet gaming or
videoconferencing. Although Port Range Forwarding can
only forward 10 ranges of ports maximum, DMZ hosting
forwards all the ports to one computer at the same time.
Setup > Time > Automatic
Time Zone Select your time zone (the default Time Zone
is Pacific Time).
4-Port SSL/IPSec VPN Router
Setup > DMZ Host
DMZ Host
DMZ Private IP Address Enter the local IP address of
the computer you want to expose. The default value of 0
deactivates the DMZ Host.
13
Chapter 4
Advanced Configuration
Click Save Settings to save your change, or click Cancel
Changes to undo it.
Setup Tab > Forwarding
The Forwarding screen allows you to set up port range
forwarding and port triggering applications. Port range
forwarding can be used to set up public services or other
specialized Internet applications on your network, while
port triggering can be used to set up triggered ranges and
forwarded ranges for Internet applications.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service
Management screen appears.
Service Management
Service Name Enter a name.
Protocol Select the protocol it uses.
Setup > Forwarding
Forwarding
Port Range Forwarding
Port forwarding can be used to set up public services on
your network. When users from the Internet make certain
requests on your network, the Router can forward those
requests to computers equipped to handle the requests.
If, for example, you set the port number 80 (HTTP) to be
forwarded to IP address 192.168.1.2, then all HTTP requests
from outside users will be forwarded to 192.168.1.2.
NOTE: You must disable the Router’s DHCP
function to use port forwarding.
You may use this function to establish a web server or FTP
server via an IP gateway. Make sure that you enter a valid
IP address. (You may need to establish a static IP address
in order to properly run an Internet server.) For added
security, Internet users will be able to communicate with
the server, but they will not actually be connected. The
packets will simply be forwarded through the Router.
Service Select the Service you want.
Port Range Enter its range.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Forwarding screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes to
undo them. Click Exit to return to the Forwarding screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Forwarding screen.
IP Address Enter the IP address of the server that you
want the Internet users to access.
Enable Select Enable to enable this port range forwarding
entry.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected application.
Port Triggering
Port triggering allows the Router to watch outgoing data
for specific port numbers. The IP address of the computer
that sends the matching data is remembered by the
Router, so that when the requested data returns through
the Router, the data is pulled back to the proper computer
by way of IP address and port mapping rules.
4-Port SSL/IPSec VPN Router
14
Chapter 4
Advanced Configuration
Some Internet applications or games use alternate ports
to communicate between the server and LAN host. When
you want to use these applications, enter the triggering
(outgoing) port and alternate incoming port in the
Port Triggering table. Then the Router will forward the
incoming packets to the LAN host.
Application Name Enter the name of the application.
Trigger Port Range Enter the starting and ending port
numbers of the trigger port range.
Incoming Port Range Enter the starting and ending port
numbers of the incoming port range.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected application.
Click Show Tables to see the details of your entries. The
Port Range Forwarding Table List appears.
Port Range Forwarding Table List
Port Range Forwarding Select this option to view the
Port Range Forwarding entries.
UPnP
UPnP Function Select Yes to enable the UPnP function.
Otherwise, keep the default, No.
Service Select the Service you want.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service
Management screen appears.
Port Triggering Select this option to view the Port
Triggering entries.
Click Refresh to update the on-screen information. Click
Close to exit this screen and return to the Forwarding
screen.
On the Forwarding screen, click Save Settings to save your
changes, or click Cancel Changes to undo them.
Setup > UPnP
Universal Plug and Play (UPnP) can be used to set up public
services on your network. When the UPnP function is
enabled, Windows XP can modify these entries via UPnP.
Setup > UPnP
Service Management
Service Name Enter a name.
Protocol Select the protocol it uses.
External Port Enter the external port number.
Internal Port Enter the internal port number.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the UPnP screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes
to undo them. Click Exit to return to the UPnP screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the UPnP screen.
Name or IP Address Enter the name or IP address of the
server that you want the Internet users to access.
Enable Select Enable to enable this UPnP entry.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected application.
Click Show Tables to see the details of your entries. The
UPnP Forwarding Table List appears.
4-Port SSL/IPSec VPN Router
15
Chapter 4
UPnP Forwarding Table List
Click Refresh to update the on-screen information. Click
Close to exit this screen and return to the UPnP screen.
On the UPnP screen, click Save Settings to save your
changes, or click Cancel Changes to undo them.
Setup > One-to-One NAT
One-to-One NAT (Network Address Translation) creates
a relationship that maps valid external IP addresses to
internal IP addresses hidden by NAT. A device with an
internal IP address may be accessed at the corresponding
external valid IP address.
To create this relationship, define internal and external
IP address ranges of equal length. Once the relationship
is defined, the device with the first internal IP address is
accessible at the first IP address in the external IP address
range, and so forth.
For example, you have a Local Area Network (LAN) for which
the ISP has assigned the IP address range of 209.19.28.16
to 209.19.28.31, with 209.19.28.16 used as the Wide Area
Network (WAN) or NAT public IP address of the Router.
The address range of 192.168.168.1 to 192.168.168.255 is
used for the devices on the LAN. With One-to-One NAT,
the devices with the internal IP addresses of 192.168.168.2
to 192.168.168.15 may be accessed at the corresponding
external IP addresses.
Advanced Configuration
Setup > One-to-One NAT
One-to-One NAT
One-to-One NAT Select Enable to use the One-to-One
NAT function.
Private Range Begin Enter the starting IP address of the
internal IP address range. This is the IP address of the first
device that
Public Range Begin Enter the starting IP address of the
public IP address range. This IP address is provided by the
ISP. (Do not include the Router’s WAN IP Address.)
Range Length Enter the number of IP addresses in the
range. The range length cannot exceed the number of
valid IP addresses. To map a single address, enter 1.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 64. To delete an entry,
select it and click Delete selected range.
NOTE: One-to-One NAT affects how the firewall
functions work. Access to LAN devices from the
Internet is allowed unless access rules are set.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
NOTE: The Router’s WAN IP address should not
be included in the range you specify.
4-Port SSL/IPSec VPN Router
Setup > MAC Clone
Some ISPs require that you register a MAC address, which
is a 12-digit code assigned to a unique piece of hardware
for identification. The MAC Clone feature “clones” your
network adapter’s MAC address onto the Router, so you
don’t have to call your ISP to change the registered MAC
address to the Router’s MAC address.
For the WAN port, you can assign or clone a MAC address.
16
Chapter 4
Advanced Configuration
User Name and Password Enter your DynDNS.org
account information.
Host Name Enter your host name in the three Host Name
fields. For example, if your host name were myhouse.
dyndns.org, then myhouse would go into the first field,
dyndns would go into the second field, and org would go
into the last field.
Click Save Settings, and the status of the DDNS function
will be updated.
Setup > MAC Clone
MAC Clone
User Defined WAN MAC Address To manually clone a
MAC address, select User Defined WAN MAC Address,
and then enter the 12 digits of your adapter’s MAC
address.
MAC Address from this PC To clone the MAC address
of the computer you are currently using to configure the
Router, select MAC Address from this PC.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Setup > DDNS
Dynamic Domain Name System (DDNS) service allows
you to assign a fixed domain name to a dynamic WAN IP
address, so you can host your own web, FTP or other type
of TCP/IP server in your LAN. The DDNS feature is disabled
by default.
Before configuring DDNS, visit www.dyndns.org and
register a domain name. (The DDNS service is provided by
DynDNS.org).
Internet IP Address The Router’s current Internet IP
address is displayed. Because it is dynamic, this will
change.
Status The status of the DDNS function is displayed. If
the status information indicates an error, make sure you
have correctly entered the information for your account
with your DDNS service.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Setup > Advanced Routing
The Advanced Routing screen allows you to configure the
dynamic and static routing settings.
Setup > DDNS
DDNS
DDNS Service To enable DDNS, select DynDNS.org.
Otherwise, select Disable.
4-Port SSL/IPSec VPN Router
Setup > Advanced Routing
Advanced Routing
Dynamic Routing
The Router’s dynamic routing feature can be used, so
the Router will automatically adjust to physical changes
in the network’s layout. Using the dynamic RIP protocol,
the Router calculates the most efficient route for the
network’s data packets to travel between the source and
the destination, based upon the shortest paths. The RIP
protocol regularly broadcasts routing information to
17
Chapter 4
Advanced Configuration
other routers on the network. It determines the route that
the network packets take based on the fewest number of
hops between the source and the destination.
Working Mode Select Gateway mode if the Router
is hosting your network’s connection to the Internet.
Select Router mode if the Router exists on a network
with other routers, including a separate network gateway
that handles the Internet connection. In Router mode,
any computer connected to the Router will not be able
to connect to the Internet unless you have another router
function as the gateway.
RIP (Routing Information Protocol) To use dynamic
routing for communication of network data, select
Enabled. Otherwise, keep the default, Disabled.
Receive RIP versions To use dynamic routing for
reception of network data, select the protocol you want:
None, RIPv1, RIPv2, or Both RIP v1 and v2.
Transmit RIP versions To use dynamic routing for
transmission of network data, select the protocol you want:
None, RIPv1, RIPv2 - Broadcast, or RIPv2- Multicast.
Static Routing
If the Router is connected to more than one network or
there are multiple routers installed on your network, it
may be necessary to set up static routes. The static routing
function determines the path that data follows over your
network before and after it passes through the Router. You
can use static routing to allow different IP domain users to
access the Internet through the Router.
Static routing is a powerful feature that should be used
by advanced users only. In many cases, it is better to
use dynamic routing because it enables the Router to
automatically adjust to physical changes in the network’s
layout.
If you want to use static routing, the Router’s DHCP settings
must be disabled. Then add routing entries to the Static
Routing table. These entries tell the Router where to send
all incoming packets. All of your network routers should
direct the default route entry to the 4-Port SSL/IPSec VPN
Router.
Subnet Mask Enter the subnet mask used on the
destination LAN IP domain. For Class C IP domains, the
subnet mask is 255.255.255.0.
Default Gateway Enter the IP address of your network’s
gateway. If this Router is used to connect your network to
the Internet, then the gateway IP is the Router’s Internet
IP address. If you have another router handling your
network’s Internet connection, enter the IP address of that
router instead.
Hop Count Enter the appropriate value (maximum is 15).
This indicates the number of nodes that a data packet
passes through before reaching its destination. A node is
any device on the network, such as a switch, PC, or router.
Interface Select the appropriate interface. The Interface
tells you whether your network is on the LAN or the WAN
(the Internet). If you’re connecting to a sub-network, select
LAN. If you’re connecting to another network through the
Internet, select the appropriate WAN port option.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected IP.
Click Show Tables to see the details of your entries. Click
Save Settings to save your changes, or click Cancel
Changes to undo them.
DHCP > Setup
The Router can be used as a DHCP (Dynamic Host
Configuration Protocol) server on your network. A DHCP
server automatically assigns available IP addresses to
computers on your network. If you choose to enable the
DHCP server option, all of the computers on your LAN
must be set to obtain an IP address automatically from a
DHCP server. (By default, Windows computers are set to
obtain an IP automatically.)
If the Router’s DHCP server function is disabled, you have
to carefully configure the IP address, subnet mask, and
DNS settings of every computer on your network. Make
sure you do not assign the same IP address to different
computers.
NOTE: Static routing is an advanced feature.
Create these routes with care.
To create a static route entry, enter the following
information:
Destination IP Enter the network address of the remote
LAN segment. For a standard Class C IP domain, the
network address is the first three fields of the Destination
LAN IP, while the last field should be 0.
4-Port SSL/IPSec VPN Router
18
Chapter 4
Advanced Configuration
Unknown MAC Address List
To add an IP address and MAC address set to the Static
IP list, select Enable, and then click Apply. To add all IP
addresses and MAC addresses to the Static IP list, click
Select All.
To update the on-screen information, click Refresh. To
exit this screen and return to the DHCP > Setup screen,
click Close.
Static IP Address Enter the static IP address. You can
enter 0.0.0.0 if you want the Router to assign a static IP
address to the device.
MAC Address Enter the MAC address of the device.
Name Enter a descriptive name for the device.
Enable Select Enable to assign the static IP address to
this device.
DHCP > Setup
Setup
Enable DHCP Server To use the Router as your network’s
DHCP server, select Enable DHCP Server. If you already
have a DHCP server on your network, remove the check
mark.
Dynamic IP
Client Lease Time The Client Lease Time is the amount
of time a network user will be allowed connection to the
Router with their current dynamic IP address. Enter the
amount of time, in minutes, that the user will be “leased”
this dynamic IP address. The range is 5-43,200 minutes.
The default is 1440 minutes.
Dynamic IP Range Start/End Enter a starting IP address
and ending IP address to create a range of available IP
addresses. The default range is 100-149. Enter a value for
the DHCP server to start with when issuing IP addresses.
This value must be 192.168.1. 2 or greater, because the
default IP address for the Router is 192.168.1.1.
Static IP
Click Add to List, and configure as many entries as you
would like, up to a maximum of 100. To delete an entry,
select it and click Delete selected Entry.
Block MAC address on the list with wrong IP address To
block traffic from devices with MAC addresses on the Static
IP list but using the wrong IP addresses, select this option.
It prevents users from changing device IP addresses
without your permission.
Block MAC address not on the list To block traffic from
devices using dynamic IP addresses, select this option. It
blocks all devices with MAC addresses not listed on the
Static IP list.
DNS
DNS Server You can assign DNS server(s) to the DHCP
clients so the Router will use the DNS server(s) for faster
access to functioning DNS server(s). Enter the IP address
of at least one DNS server.
WINS
WINS Server Windows Internet Naming Service (WINS)
is a service that resolves NetBIOS names to IP addresses.
WINS is assigned if the computer (DHCP client) requests
one. If you do not know the IP address of the WINS server,
keep the default, 0.0.0.0.
You can assign a static IP address to a specific device based
on its MAC address.
Show unknown MAC addresses Click Show unknown
MAC addresses to view all devices’ IP addresses and
corresponding MAC addresses. The Unknown MAC
Address List appears.
4-Port SSL/IPSec VPN Router
19
Chapter 4
Advanced Configuration
NOTE: To support NetBIOS for DHCP and Virtual
Passage clients, the Router uses two methods.
(Virtual Passage is an ActiveX-based VPN client
that provides full network connectivity for
Windows users. It allows remote access to the
Router’s network through a secure connection.)
First, when the DHCP and Virtual Passage clients
receive dynamic IP addresses from the Router,
it automatically includes the information of
the WINS server to support NetBIOS. Second,
if a user sets up a static IP address, then the IP
address, subnet mask, default gateway, and
DNS server settings must be configured on
the Internet Protocol (TCP/IP) screen of the
Windows operating system. Then the WINS IP
address must be configured on the advanced
TCP/IP screen. (For more information, refer to
Windows Help.)
Click Save Settings to save your changes, or click Cancel Changes to undo them.
DHCP > Status
Client Table
For all network clients using the DHCP server, the Client
Table shows the current DHCP Client information:
Client Host Name This is the name assigned to a client
host.
IP Address It is the dynamic IP address assigned to a
client.
MAC Address This indicates the MAC address of a client.
Leased Time It displays the amount of time a network
user will be allowed connection to the Router with their
current dynamic IP address.
Delete Click the Trash Can icon to delete a DHCP client,
and the client host’s IP address will be released.
Click Refresh to refresh the on-screen information.
DHCP > Multiple VLANs
Use this screen to establish relationships between multiple
subnets and Virtual Local Area Networks (VLANs).
On the Status screen, view the status information for the
DHCP server and its clients.
DHCP > Status
Status
For the DHCP server, the following information is shown:
DHCP Server This is the IP address of the DHCP server.
Dynamic IP Used It shows the number of dynamic IP
addresses used.
DHCP Available This indicates the number of dynamic IP
addresses available.
Total It shows the total number of dynamic IP addresses
that can be assigned by the DHCP server.
DHCP > Multiple VLANs
Multiple VLANs
Enable Multiple VLANs Select this option to establish a
relationship between multiple subnets and VLANs. If you
enable this option and the multiple subnets and VLANs are
not enabled, then the Router will prompt you to configure
and enable the multiple subnets and VLANs.
VLAN ID The VLANs are configured on the Port
Management > Create VLAN screen (by default, all VLANs
created on this screen are part of the default subnet).
The VLAN IDs you assigned are displayed on the Multiple VLANs screen.
Multiple Subnet Multiple subnets define different IP
networks using the subnet mask. They are created after
multiple VLANs are created. (If you want to change the
settings of VLAN 1, then use the Setup > Network screen
4-Port SSL/IPSec VPN Router
20
Chapter 4
Advanced Configuration
to configure the Device IP Address and Subnet Mask
settings.)
Subnet1-4 The subnet numbers are created according
•
to the VLAN numbers. (The multiple subnets can also
be configured on the Setup > Network screen.)
IP Address Enter an IP address.
•
Subnet Mask Select the appropriate subnet mask.
•
Dynamic IP Range When the IP Address and Subnet
Mask settings are configured, the range of IP addresses
is displayed. You can change the range of IP addresses
as long as the total number of IP addresses assigned by
DHCP is 253. The greater the number of multiple subnets,
the fewer the number of IP addresses assigned by DHCP.
NOTE: The Router’s built-in DHCP server can
assign up to 253 IP addresses.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
DHCP > Inter-VLAN Routing
To route packets between different VLANs, enable the
Multiple VLANs option on the Multiple VLANs screen, and
then select the VLANs on the Inter-VLAN Routing screen.
The Internet has a service called the Domain Name Service
(DNS), which allows users to enter an easily remembered
host name, such as www.linksys.com, instead of numerical
TCP/IP addresses to access Internet resources. The DNS
Name Lookup tool will return the numerical TCP/IP address
of a host name.
The Ping test bounces a packet off a machine on the
Internet back to the sender. This test shows if the Router
is able to contact the remote host. If users on the LAN
are having problems accessing services on the Internet,
try pinging the DNS server or other machine at the ISP’s
location. If this test is successful, try pinging devices
outside the ISP. This will show if the problem lies with the
ISP’s connection.
Diagnostic
DNS Name Lookup/Ping Select which tool you want
to use, DNS Name Lookup or Ping. Then proceed to the
appropriate instructions.
DNS Name Lookup
Before using this tool, make sure the IP address of the DNS
server is entered on the Setup > Network screen; otherwise,
this tool will not work.
DHCP > Inter-VLAN Routing
Inter-VLAN Routing
VLAN1-4 Select the VLANs that can route packets to each
other. For example, if you select VLAN1 and VLAN2, then
packets can be routed between VLAN1 and VLAN2, but
packets cannot be routed between VLAN3 and VLAN4.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
System Management > Diagnostic
The Router has two built-in tools, DNS Name Lookup
and Ping, which are used for troubleshooting network
problems.
4-Port SSL/IPSec VPN Router
System Management > Diagnostic > DNS Name Lookup
Look up the name Enter the host name, and click Go.
(Do not add the prefix http:// or else you will get an error
message.) The Router will then query the DNS server and
display the result at the bottom of the screen.
Ping
Before using this tool make sure you know the device or
host’s IP address. If you do not know it, use the Router’s
DNS Name Lookup tool to find the IP address.
21
Chapter 4
System Management > Diagnostic > Ping
Advanced Configuration
Ping host or IP address Enter the IP address of the device
being pinged, and click Go. The test will take a few seconds
to complete. When completed, the Router will display the
results at the bottom of the screen. The results include
this information: status; number of packets transmitted,
received, or lost; and round trip time (minimum, maximum,
and average).
System Management > Factory Default
Use this screen to clear all of your configuration information
and restore the Router to its factory default settings. Only
use this feature if you wish to discard all the settings and
preferences that you have configured.
System Management > Firmware Upgrade
Firmware Upgrade
To download the firmware, refer to the Firmware Download
instructions. If you have already downloaded the firmware
onto your computer, then click the Browse button to look
for the file.
NOTE: If you are using Internet Explorer on
Windows XP, disable the pop-up blocking
function before you upgrade the Router’s
firmware. Refer to “Appendix O: Firmware
Upgrade” for more information.
Firmware Upgrade Right Now After you have selected
the file, click Firmware Upgrade Right Now.
NOTE: The Router will take approximately ten
minutes to upgrade its firmware. During this
process, do not power off the Router or press
the Reset button.
Firmware Download
System Management > Factory Default
Factory Default
Return to Factory Default Setting Click Return to
Factory Default Setting if you want to restore the Router
to its factory default settings. After clicking the button, a
confirmation screen appears. Click OK to continue.
System Management > Firmware Upgrade
You can use this feature to upgrade the Router’s firmware
to the latest version.
4-Port SSL/IPSec VPN Router
Firmware Download from Linksys Web Site If you need
to download the latest version of the Router’s firmware,
click Firmware Download from Linksys Web Site. The
Support page of the Linksys website appears.
Select 4-Port SSL/IPSec VPN Router from the dropdown menu, and choose the firmware from the available
options. After downloading the firmware file, extract it
on your computer. Then follow the Firmware Upgrade
instructions.
For more details, refer to “Appendix O: Firmware
Upgrade”.
System Management > Restart
If you need to restart the Router, Linksys recommends that
you use the Restart tool on this screen. When you restart
22
Chapter 4
Advanced Configuration
from the Restart screen, then the Router will send out your
log file before it is reset.
System Management > Restart
Restart
Restart Router Click Restart Router to restart the
Router.
System Management > Setting Backup
This screen allows you to make a backup file of your
preferences file for the Router. To save the backup file, you
need to export the configuration file. To use the backup
preferences file, you need to import the configuration
file.
called RVL200.exp by default, but you may rename it if
you wish. This process may take up to a minute.
System Management > Port Mirroring
Port Mirroring monitors and copies network traffic by
transferring copies of incoming and outgoing packets
from source ports to a target port. This feature is used as a
monitoring, diagnostic, and debugging tool.
System Management > Port Mirroring
Port Mirroring
Enable Port Mirroring Select this option to use Port
Mirroring.
System Management > Setting Backup
Import Configuration File
To import a configuration file, first specify where your
backup preferences file is located. Click Browse, and then
select the appropriate configuration file.
Import After you select the file, click Import. This process
may take up to a minute. Then restart the Router so that
the changes will take effect.
Export Configuration File
Export To export the Router’s current configuration file,
click Export, and then select the location where you would
like to store your backup preferences file. This file will be
Source Port Select the port whose traffic will be captured
by a target (mirror) port. The Source Port can be any LAN
port or the WAN port.
Target Port Select the mirror port. (Only one LAN port
can be set as a mirror port.)
Mode Select the port mode configuration. Keep the
default, Rx Only, to use port mirroring on receiving ports.
Select Tx Only to use port mirroring on transmitting ports.
Select Both to use port mirroring on both receiving and
transmitting ports.
Click Add to List, and configure as many entries as you
would like, up to a maximum of four. To delete an entry,
select it and click Delete.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
System Management > IGMP Snooping
IGMP Snooping uses IGMP to forward the multicast traffic
of a group to ports that are members of that group.
4-Port SSL/IPSec VPN Router
23
Chapter 4
System Management > IGMP Snooping
Enable IGMP Snooping Select this option to use IGMP
Snooping.
Timeout Enter the time interval during which IGMP
broadcast packets from the IGMP server are sent to the
IGMP clients behind a specific port of the Router. If the time
interval has past, IGMP broadcast packets are broadcast to
all ports of the Router. After the timeout, the time interval
will restart if the Router receives IGMP broadcast packets
that need to sent to the IGMP clients. The default is 248
seconds.
Advanced Configuration
Speed Select the port speed, 10M or 100M.
Duplex Select the duplex mode, Half or Full.
Auto Neg. Select Enable if you want the Router’s ports
to auto-negotiate connection speeds and duplex mode;
then you will not need to set up speed and duplex settings
separately.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Port Management > Port Status
Status information is displayed for the selected port.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Port Management > Port Setup
Configure the connection settings for each local port,
such as priority, speed, and duplex. You can also enable or
disable the auto-negotiation feature for all ports.
Port Management > Port Setup
Basic Per Port Config.
The Basic Per Port Config. table displays the following:
Port Management > Port Status
Port ID To see the status information and settings for a
specific port, select its ID number or name.
Port Status
Summary
For the selected port, the Summary table displays the
following:
Type The port type is displayed.
Interface The interface type, LAN or WAN, is displayed.
Link Status The status of the connection is displayed.
Port Activity The status of the port is displayed.
Speed Status The speed of the port, 10 Mbps, or 100
Mbps, is displayed.
Duplex Status The duplex mode is displayed, Half or
Full.
Auto negotiation The status of the feature is displayed.
Port ID The port number or name is displayed.
Interface The port’s interface type, LAN or WAN, is
displayed.
Disable To disable a port, select Disable.
4-Port SSL/IPSec VPN Router
Statistics
For the selected port, the Statistics table displays the
following:
24
Chapter 4
Advanced Configuration
Port Receive Packet Count The number of packets
received is displayed.
Port Receive Packet Byte Count The number of packet
bytes received is displayed.
Port Transmit Packet Count The number of packets
transmitted is displayed.
Port Transmit Packet Byte Count The number of packet
bytes transmitted is displayed.
Port Packet Error Count The number of packet errors is
displayed.
Click Refresh to retrieve the most recent settings and
statistics.
Port Management > Create VLAN
Use this screen to create a Virtual Local Area Network
(VLAN), a group of ports that can be located anywhere
in the network, but they communicate as though they
belong to the same physical segment. VLANs can be easily
organized to reflect departmental groups (such as sales or
engineering), usage groups (such as e-mail), or multicast
groups (such as users of multimedia applications, including
videoconferencing).
on the interface.) Click Add VLAN to add the single
VLAN ID.
VLAN ID Range Enter the starting and ending port
numbers of the VLAN ID Range. Then click Add Range.
VLAN ID and Description All of the VLAN IDs that you
have set up and the VLAN descriptions you have defined
for each VLAN on the VLAN Membership screen will be
applied and displayed on the Create VLAN screen.
Delete VLAN To delete a VLAN, select it from the list and
click Delete VLAN.
Port Management > Port Setting
Select the mode and configure the Port VLAN Identifier
(PVID) for each LAN port of the Router.
Port Management > Create VLAN
Create VLAN
The Router supports up to 15 VLANs, excluding the default
VLAN.
Enable VLAN Select Enable VLAN to use the VLAN
feature.
When the VLAN feature has been enabled, the default
VLAN ID 1 will be displayed and applied. You can create a
single VLAN or create multiple VLANs by range.
VLAN ID Enter a VLAN ID number from 2 to 4094. (The
default VLAN ID 1 is assigned to untagged frames received
Port Management > Port Setting
Port Setting
Port ID The Router’s LAN ports are numbered 1 to 4.
Mode Select the appropriate mode: General, Access
(default), or Trunk. For a General port, the transmitted
frames can be tagged or untagged, and it will be defined
on the VLAN Membership screen. For an Access port, the
transmitted frames will be untagged. A port configured as
a Trunk port acts as a direct link between two switches. The
transmitted frames will be tagged to identify the source
VLAN, but the frames belonging to the default VLAN will
be untagged.
PVID Enter the PVID assigned to untagged frames
received on the interface. The default is 1.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Port Management > VLAN Membership
Use this screen to define the members of a VLAN.
4-Port SSL/IPSec VPN Router
25
Chapter 4
Port Management > VLAN Membership
VLAN Membership
VLAN ID Select the VLAN ID number that you configured
on the Create VLAN screen.
Advanced Configuration
QoS > Bandwidth Management
Quality of Service (QoS) features let you control how
the Router manages network traffic. With Bandwidth
Management (Layer 3), the Router can provide better
service to selected types of network traffic. There are two
types of functionality available, and only one type can
work at one time. Rate Control functionality is for minimum
(guaranteed) bandwidth and maximum bandwidth by
service or IP address, while Priority functionality is for
services. Both types can control inbound or outbound
traffic.
Description Enter the VLAN group name. You can use up
to 50 characters.
For the default VLAN 1, all ports will be set to Access mode
and all frames will be UnTagged.
For the Router’s four ports, select the appropriate mode:
Access Select this mode if you want the port to be
UnTagged or Excluded.
Trunk Select this mode if you want the port to be Tagged,
UnTagged, or Excluded.
General Select this mode if you want the port to be
Tagged, UnTagged, or Excluded.
For the Router’s four ports, select the appropriate port
type:
UnTagged Select this type if you want the port to be
UnTagged.
Tagged Select this type if you want the port to be
Tagged.
Exclude Select this type if you want the port to be
excluded from the selected VLAN.
Port VLAN Summary
The Port VLAN Summary table lists the settings for the
selected VLAN:
Port ID The Router’s LAN ports are listed in this column.
Port VLAN Summary The Tagged (T) or UnTagged (U)
status for each port is displayed in this column.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
QoS > Bandwidth Management > Rate Control
Bandwidth Management
Bandwidth
Interface The WAN interface is automatically selected.
Upstream Enter the maximum upstream bandwidth
provided by your ISP. The default is 512 kbit/sec.
Downstream Enter the maximum downstream
bandwidth provided by your ISP. The default is
512 kbit/sec.
Bandwidth Management Type
Type Select the type of functionality you want to use,
Rate Control or Priority. Rate Control functionality is
for minimum (guaranteed) bandwidth and maximum
(limited) bandwidth by service or IP address, while
Priority functionality is for services. Then proceed to the
instructions for the type you selected.
4-Port SSL/IPSec VPN Router
26
Chapter 4
Advanced Configuration
Rate Control
Service Select the Service you want.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service
Management screen appears.
Service Management
Click Add to List, and configure as many rules as you
would like, up to a maximum of 100. To delete a rule, select
it and click Delete selected application.
Click Summary to see a summary of the Rate Control
rules.
Summary (Rate Control Selected)
To change a rule, click Edit. To update the list, click
Refresh. To return to the Bandwidth Management screen,
click Close.
On the Bandwidth Management screen, click Save Settings
to save your changes, or click Cancel Changes to undo
them.
Priority
Service Name Enter a name.
Protocol Select the protocol it uses.
Port Range Enter its range.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Bandwidth Management screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes
to undo them. Click Exit to return to the Bandwidth Management screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Bandwidth Management
screen.
IP Enter the IP address or range you need to control. To
include all internal IP addresses, keep the default, 0.
Direction Select Upstream for outbound traffic, or select
Downstream for inbound traffic.
Min. Rate Enter the minimum rate for the guaranteed
bandwidth.
QoS > Bandwidth Management > Priority
Service Select the Service you want.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service
Management screen appears.
Max. Rate Enter the maximum rate for the maximum
bandwidth.
Enable Select Enable to use this Rate Control rule.
4-Port SSL/IPSec VPN Router
27
Chapter 4
Service Management
Service Name Enter a name.
Advanced Configuration
Summary (Priority Selected)
To change a rule, click Edit. To update the list, click
Refresh. To return to the Bandwidth Management screen,
click Close.
On the Bandwidth Management screen, click Save Settings
to save your changes, or click Cancel Changes to undo
them.
QoS > QoS Setup
The QoS Setup screen lets you enable QoS and configure
Trust Mode and Class of Service (CoS) settings.
Protocol Select the protocol it uses.
Port Range Enter its range.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Bandwidth Management screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes
to undo them. Click Exit to return to the Bandwidth Management screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Bandwidth Management
screen.
Direction Select Upstream for outbound traffic, or select
Downstream for inbound traffic.
Priority Select High, Middle, or Low. High priority
services will share 60% of the total system bandwidth,
while Low priority services will share 10% of the total
bandwidth. The default is Middle.
Enable Select Enable to use this Priority rule.
Click Add to List, and configure as many rules as you
would like, up to a maximum of 50. To delete a rule, select
it and click Delete selected application.
Click Summary to see a summary of the Priority rules. The
Summary screen appears.
QoS > QoS Setup
QoS Setup
QoS Mode
QoS Mode Select the appropriate mode, Disable or
Basic. The default is Disable, which indicates no priority.
If the Basic mode is selected, the Router will apply the
settings configured on the QoS Setup, Queue Settings, and
DSCP Settings screens.
Trust Mode Default CoS
Configure the Trust Mode and Default CoS priority values
for each LAN port.
Port ID The ID numbers of the Router’s four LAN ports are
displayed in this column.
4-Port SSL/IPSec VPN Router
Trust Mode Select the appropriate mode: None, CoS, or
DSCP. The default is None.
28
Chapter 4
Advanced Configuration
None
If the None option is selected, then the Router prioritizes
each packet based on the required level of service for
its four LAN ports, using four priority queues with strict
or Weighted Round Robin (WWR) queuing. You can use
these functions to assign independent priorities for delaysensitive data and best-effort data.
When a port is set to None mode, then the Router will not
check CoS VLAN tag priority or DSCP/ToS priority bits in
the IP header.
CoS
If the CoS option is selected, then the Router will use CoSbased QoS in Layer 2. This type of QoS lets you specify
which data packets have higher priority when traffic is
buffered due to congestion. Data packets in high priority
queues will be transmitted before those in the lower
priority queues. You can map eight priority levels to the
Router’s input queues. If the port is configured as CoS
mode, then the order of importance for the application of
priority rules are as follows: 1) CoS, 2) DSCP, and 3) None
(port-based priority).
DSCP
If the Differentiated Services Code Point (DSCP) option
is selected, then the Router will use DSCP-based QoS
in Layer 3. Traffic priorities can be specified in the IP
header of a frame. With DSCP-based QoS, the Router can
use the priority bits in the Type of Service (ToS) octet to
prioritize traffic. If priority bits are used, the ToS octet may
contain three bits for IP Precedence or six bits for DSCP
service. If the port is configured as DSCP mode, then the
order of importance for the application of priority rules
are as follows: 1) DSCP, 2) CoS, and 3) None (port-based
priority).
Default CoS Select the default CoS priority value, 0 to 7,
with 0 being the lowest priority.
CoS Settings
Priority This is the CoS value, 0 to 7 (7 is the highest
priority).
Queue Select the traffic forwarding queue number to
which the CoS priority is mapped. You can designate up
to four traffic priority queues configured on the Queue Settings screen.
To reset the CoS queue settings to their factory defaults,
click Restore Defaults. The defaults are 2, 1, 1, 2, 3, 4, and 4 for the Priority values, 0 to 7.
QoS > Queue Settings
You can set the Router to service the queues based on a
strict rule that requires all traffic in a higher priority queue
to be processed before lower priority queues are serviced,
or you can set the Router to use Weighted Round Robin
(WWR) queuing, which specifies a relative weight of each
queue. WRR uses a predefined relative weight for each
queue, which determines the percentage of service time
the Router services each queue before moving on to the
next queue. This prevents head-of-line blocking, which
can occur with strict priority queuing.
QoS > Queue Settings
Queue Settings
Queue The number of the queue, 1 to 4, is displayed (4 is
the highest priority queue).
Strict Priority With Strict Priority, the Router services
the egress queues in sequential order, so all traffic in the
higher priority queues is transmitted before the lower
priority queues are serviced. To base traffic scheduling on
queue priority, select Strict Priority. The WRR Weight will
be 1, 2, 4, and 8, respectively, for queues 1 to 4.
WRR With WRR, the Router shares bandwidth at the egress
ports using scheduling weights 1, 2, 4, and 8, respectively,
for queues 1 to 4. If you want to use WRR queuing, select
WRR.
WRR Weight If you selected WRR, set a new weight for the
selected traffic class, within the range of 1 to 15. (Queue 1
is fixed at a weight of 1, and it cannot be changed.)
% of WRR Bandwidth This is the percentage of
bandwidth used by WRR. This automatically changes if
you change the WRR Weight for a queue.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
4-Port SSL/IPSec VPN Router
QoS > DSCP Settings
Traffic priorities can be specified in the IP header of a
frame. With Differentiated Services Code Point (DSCP)-
29
Chapter 4
based QoS in Layer 3, the Router can use the priority bits
in the Type of Service (ToS) octet to prioritize traffic. If
priority bits are used, the ToS octet may contain three bits
for IP Precedence or six bits for DSCP service.
QoS > DSCP Settings
Advanced Configuration
Firewall > General
General
Firewall The firewall is enabled by default. If you disable
it, then the SPI, DoS, and Block WAN Request features,
Access Rules, and Content Filters will also be disabled, and
the Remote Management feature will be enabled.
DSCP Settings
DSCP to Queue
DSCP This is the DSCP value in the incoming packet.
Queue Select the traffic forwarding queue number to
which the DSCP priority is mapped. You can designate
up to four traffic priority queues configured on the Queue Settings screen.
To reset this screen to the factory default queue settings,
click Restore Defaults. The defaults are 1 for DSCP values
0-15, 2 for DSCP values 16-31, and 3 for DSCP values
32-63.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Firewall > General
Enable or disable a variety of firewall, security, and web
features.
SPI (Stateful Packet Inspection) This option is enabled
by default. The Router’s firewall uses Stateful Packet
Inspection to review the information that passes through
the firewall. It inspects all packets based on the established
connection, prior to passing the packets for processing
through a higher protocol layer.
DoS (Denial of Service) This option is enabled by default.
It protects internal networks from Internet attacks, such
as SYN Flooding, Smurf, LAND, Ping of Death, IP Spoofing,
and reassembly attacks.
Block WAN Request This option is enabled by default.
Using this feature, the Router drops both unaccepted TCP
request and ICMP packets from the WAN side. Hackers will
not find the Router by pinging the WAN IP address.
Remote Management/SSL VPN This option is disabled
by default. If you want to use SSL or manage this Router
through a WAN connection, first change the password
on the Setup > Password screen (this prevents any
user from accessing the Router or using SSL with the
default password). Then select Enable for the Remote
Management/SSL VPN setting.
NOTE: SSL VPN has higher priority than Port
Forwarding when HTTPS is enabled.
4-Port SSL/IPSec VPN Router
HTTPS If Remote Management/SSL VPN is enabled,
HTTPS is enabled by default. If Remote Management/SSL
VPN is disabled, HTTPS is disabled by default.
30
Chapter 4
Advanced Configuration
NOTE: SSL VPN has higher priority than Port
Forwarding when HTTPS is enabled.
HTTP To allow HTTP connections for remote management,
select Enable. Otherwise, select Disable. Then enter the
port number you want to use for remote management
(port 80 or 8080 is usually used).
Multicast Pass Through This option is disabled by default.
IP multicasting occurs when a single data transmission
is sent to multiple recipients at the same time. Using
this feature, the Router allows IP multicast packets to be
forwarded to the appropriate LAN devices. Multicast Pass
Through is used for Internet games, videoconferencing,
and multimedia applications.
SIP Application Layer Gateway This option is enabled
by default. It enables use of Session Initiation Protocol
(SIP), an application-layer control (signaling) protocol for
Internet phone calls, multimedia conferences, and instant
messaging.
Restrict WEB Features
Block Select the filters you want to use.
type, and you can apply each access rule according to a
different schedule.
With the use of custom rules, it is possible to disable all
firewall protection or block all access to the Internet, so
use extreme caution when creating or deleting access
rules.
The Router has the following default rules:
All traffic from the LAN to the WAN is allowed.
•
All traffic from the WAN to the LAN is denied.
•
Custom rules can be created to override the above default
rules, but there are four additional default rules that will
be always active and cannot be overridden by any custom
rules.
HTTP service from the LAN to the Router is always
•
allowed.
DHCP service from the LAN is always allowed.
•
DNS service from the LAN is always allowed.
•
Ping service from the LAN to the Router is always
•
allowed.
Java Java is a programming language for websites. If
•
you deny Java applets, you run the risk of losing access
to Internet sites created using this programming
language. To block Java applets, select Java.
Cookies A cookie is data stored on your PC and used
•
by Internet sites when you interact with them. To block
cookies, select Cookies.
ActiveX ActiveX is a programming language for
•
websites. If you deny ActiveX, you run the risk of losing
access to Internet sites created using this programming
language. To block ActiveX, select ActiveX.
Access to HTTP Proxy Servers Use of WAN proxy
•
servers may compromise the Router’s security. If you
block access to HTTP proxy servers, then you block
access to WAN proxy servers. To block access, select
Access to HTTP Proxy Servers.
Don’t block Java/ActiveX/Cookies/Proxy to Trusted
Domains To keep trusted sites unblocked, select this
option.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
Firewall > Access Rules
Access Rules
Except for the default rules, all configured access rules
are listed in the Access Rules table, and you can set the
priority for each custom rule. The Access Rules table lists
the following information for each access rule:
Priority The Priority is displayed.
Policy Name The name of the access rule is displayed.
Enable The status of the access rule is displayed.
Action The Action, Allow or Deny, is displayed.
Firewall > Access Rules
Access rules evaluate network traffic to decide whether
or not it is allowed to pass through the Router’s firewall.
Access Rules look specifically at a data transmission’s
source IP address, destination IP address, and IP protocol
4-Port SSL/IPSec VPN Router
Service The Service is displayed.
Source Interface The Source Interface, LAN or WAN, is
displayed.
Source The specific Source is displayed.
Destination The specific Destination is displayed.
31
Chapter 4
Time The time interval to which the access rule applies
is displayed.
Day The days to which the access rule applies is
displayed.
Click Edit to edit an access rule, and click the Trash Can
icon to delete an access rule. If the Access Rules table
has multiple pages, select a different page to view from
the Jump to drop-down menu. If you want more or fewer
entries listed per page, select a different number from the
entries per page drop-down menu.
Click Add New Rule to add new access rules, and the Add a New Access Rule screen appears.
Click the Restore to Default Rules to restore the default
rules and delete the custom access rules.
Advanced Configuration
Add a New Access Rule
Add a New Access Rule
Services
Policy Name Enter a name for the new access rule.
Action Select Allow or Deny, depending on the purpose
of the access rule.
Service Select the Service you want.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service
Management screen appears.
Service Management
Service Name Enter a name.
Protocol Select the protocol it uses.
Port Range Enter its range.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Add a New Access Rule screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes
to undo them. Click Exit to return to the Add a New Access Rule screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings to
save your changes, or click Cancel Changes to undo them.
Click Exit to return to the Add a New Access Rule screen.
Log The Router can keep a log tracking this type of
activity. To keep a log, select Log packets match this
access rule. If you do not want a log, select Not log.
NOTE: If the Deny Policies option is enabled on
the Log > System Log screen, then the log will
not include log events from the Deny access
rules on the Firewall > Access Rules screen.
Log events from the Deny access rules will be
logged separately from Deny Policies if the
option, Log packets match this rule, is selected.
If the Allow Policies option is enabled on the Log > System Log screen, then the log will include
log events from the Allow access rules on the
Firewall > Access Rules screen, regardless of the
option, Log packets match this rule.
4-Port SSL/IPSec VPN Router
Source Interface Select WAN, LAN, or Any.
32
Chapter 4
Source Select the Source IP address(es) for the access
rule. If it can be any IP address, select Any. If it is one IP
address, select Single and enter the IP address. If it is a
range of IP addresses, select Range, and enter the starting
and ending IP addresses in the Addr. Range Begin and Addr.
Range End fields. If the Source is all IP addresses, then enter
* in the Addr. Range Begin field.
Destination Select the Destination IP address(es) for the
access rule. If it can be any IP address, select Any. If it is
one IP address, select Single and enter the IP address. If
it is a range of IP addresses, select Range, and enter the
starting and ending IP addresses in the Addr. Range Begin
and Addr. Range End fields.
Scheduling
Apply this rule Decide when you want the access rule to
be enforced, and enter the hours and minutes in 24-hour
format. The default condition for any new rule is to always
enforce it.
Advanced Configuration
Decide which days of the week you want the access rule to
be enforced, and select the appropriate days.
Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Return to return to the
Access Rules screen.
Firewall > Content Filter
Use this screen to block specific domains during the
designated days and times for specific devices.
Firewall > Content Filter
Content Filter
IP/MAC Group
You can apply the content filter to specific groups of
computers. You can have up to 10 groups, and each group
can have up to 50 computers.
To create a group of computers, click Add Group. The Add Group screen appears.
4-Port SSL/IPSec VPN Router
Add Group
33
Chapter 4
Advanced Configuration
Group Name Enter a name for the new group.
Show unknown IP/MAC addresses If you do not know
a computer’s IP or MAC address, click Show unknown
IP/MAC addresses. The Unknown MAC Address List
appears.
Unknown IP Address List
IP Address
Select this option to view all LAN IP addresses.
IP Address The IP address is displayed.
Name Enter a name for the device.
Enable Select Enable to select a device.
MAC Address
Select this option to view all MAC addresses.
MAC Address The MAC address is displayed.
Name Enter a name for the device.
Enable Select Enable to select a device.
Click Apply to add the IP or MAC addresses to the group.
Click Select All to add all IP and MAC addresses. Click
Refresh to update the on-screen information. Click Close
to exit this screen and return to the Add Group screen.
Scheduling Decide when you want the content filter to
be enforced, and enter the hours and minutes in 24-hour
format. The default condition for any new content filter is
to always enforce it.
Decide which days of the week you want the content filter
to be enforced, and select the appropriate days.
Name Enter a name for a specific computer.
Type Select IP Address or MAC Address.
To delete a group, select it and click Delete selected
group on the Content Filter screen. To change the settings of a group, select it and click Edit Group.
Forbidden Domains
Block Forbidden Domains When this option is selected,
the Router will forbid access to websites on the Forbidden
Domains list.
Add To add a domain to the list, enter the address of the
domain.
Group Select the appropriate Group to which the Block
Forbidden Domains filter should apply.
To add a domain, click Add to list. To remove a domain
from the list, select the domain, and click Delete selected domain.
Website Blocking by Keywords
Enable Website Blocking by Keywords When this
option is selected, the Router will forbid access to websites
using keywords on the Keywords list.
Add To add a keyword to the list, enter the address of the
domain.
Group Select the appropriate Group to which the Website
Blocking by Keyword filter apply.
To add a keyword, click Add to list. To remove a keyword
from the list, select the keyword, and click Delete selected domain.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
IPSec VPN > Summary
This screen displays general information about the
Router’s IPSec VPN tunnel settings. The Router supports
a single Gateway-to-Gateway tunnel, which is a tunnel
created between two VPN Routers or other VPN devices.
IP Address If you selected IP Address, enter the IP address
in the fields provided.
MAC Address If you selected MAC Address, enter the
MAC address in the fields provided.
To add an entry, click Add to list. To remove an entry from
the list, select the entry, and click the Delete selected entry.
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Click Exit to return to the Content
Filter screen.
4-Port SSL/IPSec VPN Router
IPSec VPN > Summary
34
Chapter 4
Advanced Configuration
Summary
Tunnel Used The number of VPN tunnels being used is
displayed.
Tunnel Available The number of available VPN tunnels
is displayed.
Tunnel Status
Add New Tunnel Click Add New Tunnel to add a
Gateway-to-Gateway tunnel. The Mode Choose screen
appears.
Mode Choose
Gateway” section for more information. Click the Trash Can icon to delete all of your tunnel settings for each
individual tunnel.
Tunnel Enabled The number of enabled VPN tunnels is
displayed.
Tunnel Defined The number of defined VPN tunnels is
displayed.
IPSec VPN > Gateway to Gateway
Use this screen to create a new tunnel between two VPN
devices.
Click Add Now to display the Gateway to Gateway screen.
Proceed to the “IPSec VPN > Gateway to Gateway” section
for instructions. Click Return to return to the Summary
screen.
After you have added the VPN tunnel, you will see it listed
in the table.
No. It shows the number of the VPN tunnel.
Name It shows the Tunnel Name that you gave the VPN
tunnel.
Status This indicates the status of the VPN tunnel.
Phase2 Enc/Auth/Grp This shows the Phase 2
Encryption type (DES/3DES/AES-128/AES-192/AES-256),
Authentication method (MD5/SHA1), and DH Group
number (1/2/5) that you chose in the IPSec Setup section.
Local Group This shows the IP address and subnet mask
of the Local Group.
Remote Group The IP address and subnet mask of the
Remote Group are displayed here.
Remote Gateway It shows the IP address of the Remote
Gateway.
Tunnel Test Click Connect to verify the status of the
VPN tunnel. The test result will be updated in the Status
column. If the tunnel is connected, a Disconnect button
will be available so you can end the connection.
IPSec VPN > Gateway to Gateway
Add a New Tunnel
Tunnel No The tunnel number is 1.
Tunnel Name Enter a name for this VPN tunnel, such as
Los Angeles Office, Chicago Branch, or New York Division.
This allows you to identify multiple tunnels and does not
have to match the name used at the other end of the
tunnel.
Enable Check this box to enable a VPN tunnel. (When
you create a VPN tunnel, this check box will be disabled.)
Local Group Setup
Local Security Gateway Type
Config. Click Edit to open a new screen where you can
change the tunnel’s settings. Refer to the “Gateway to
4-Port SSL/IPSec VPN Router
Select the type you want to use: IP Only, IP + Domain
Name(FQDN) Authentication, IP + E-mail Addr.(USER
35
Chapter 4
Advanced Configuration
FQDN) Authentication, Dynamic IP + Domain
Name(FQDN) Authentication, or Dynamic IP + Email Addr.(USER FQDN) Authentication. Follow the
instructions for the type you want to use.
NOTE: The Local Security Gateway Type you
select should match the Remote Security
Gateway Type selected on the VPN device at the
other end of the tunnel.
IP Only
The default is IP Only. Only the computer with a specific IP
address will be able to access the tunnel.
IP address The WAN (or Internet) IP address of the Router
will automatically appear.
IP + Domain Name(FQDN) Authentication
The FQDN and IP address must match the Remote Security
Gateway of the remote VPN device, and they can only be
used for one tunnel connection.
Domain Name Enter the Fully Qualified Domain Name
(FQDN), which is the host name and domain name for a
specific computer on the Internet.
IP address The WAN (or Internet) IP address will
automatically appear.
IP + E-mail Addr.(USER FQDN) Authentication
E-mail address Enter the e-mail address for
authentication.
IP address The WAN (or Internet) IP address will
automatically appear.
Dynamic IP + Domain Name(FQDN) Authentication
The Local Security Gateway will be a dynamic IP address,
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
the Router, the Router will work as a responder.
The domain name must match the Remote Security
Gateway of the remote VPN device and can only be used
for one tunnel connection.
Domain Name Enter the domain name for authentication.
(Once used, you cannot use it again to create a new tunnel
connection.)
Dynamic IP + E-mail Addr.(USER FQDN) Authentication
The Local Security Gateway will be a dynamic IP address,
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
the Router, the Router will work as a responder.
E-mail address Enter the e-mail address for
authentication.
Local Security Group Type
Select the local LAN user(s) behind the Router that can
use this VPN tunnel. Select the type you want to use: IP,
Subnet, or IP Range. Follow the instructions for the type
you want to use.
NOTE: The Local Security Group Type you select
should match the Remote Security Group Type
selected on the VPN device at the other end of
the tunnel.
After you have selected the Local Security Group Type, the
settings available on this screen may change, depending
on which selection you have made.
IP
Only the computer with a specific IP address will be able
to access the tunnel.
IP address Enter the appropriate IP address. The default
IP is 192.168.1.0.
Subnet
The default is Subnet. All computers on the local subnet
will be able to access the tunnel.
IP address Enter the IP address. The default is
192.168.1.0.
Subnet Mask Enter the subnet mask. The default is
255.255.255.0.
IP Range
Specify a range of IP addresses within a subnet that will be
able to access the tunnel.
IP range Enter the range of IP addresses. The default is
192.168.1.0~254.
Remote Group Setup
Before you configure the Remote Group Setup, make
sure your VPN tunnel will have two different IP subnets.
For example, if the local 4-Port SSL/IPSec VPN Router has
an IP scheme of 192.168.1.x (x being a number from 1 to
254), then the remote VPN router should have a different
IP scheme, such as 192.168.2.y (y being a number from 1
to 254). Otherwise, the IP addresses will conflict, and the
VPN tunnel cannot be created.
Remote Security Gateway Type
Select the type you want to use: IP Only, IP + Domain
Name(FQDN) Authentication, IP + E-mail Addr.(USER
FQDN) Authentication, Dynamic IP + Domain
Name(FQDN) Authentication, or Dynamic IP + Email Addr.(USER FQDN) Authentication. Follow the
instructions for the type you want to use.
4-Port SSL/IPSec VPN Router
36
Chapter 4
Advanced Configuration
NOTE: The Remote Security Gateway Type you
select should match the Local Security Gateway
Type selected on the VPN device at the other
end of the tunnel.
IP Only
The default is IP Only. Only the computer with a specific IP
address will be able to access the tunnel. Select IP address
or IP by DNS Resolved.
IP address Select this option if you know the static IP
address of the remote VPN device at the other end of the
tunnel, and then enter the IP address.
IP by DNS Resolved Select this option if you do not
know the static IP address of the remote VPN device but
you do know its domain name. Then enter the remote VPN
device’s domain name on the Internet. The Router will
retrieve the IP address of the remote VPN device.
IP + Domain Name(FQDN) Authentication
The IP address and domain name ID must match the Local
Gateway of the remote VPN device, and they can only be
used for one tunnel connection.
IP address Select this option if you know the static IP
address of the remote VPN device at the other end of the
tunnel, and then enter the IP address.
IP by DNS Resolved Select this option if you do not
know the static IP address of the remote VPN device but
you do know its domain name. Then enter the remote VPN
device’s domain name on the Internet. The Router will
retrieve the IP address of the remote VPN device.
IP + E-mail Addr.(USER FQDN) Authentication
IP address Select this option if you know the static IP
address of the remote VPN device at the other end of the
tunnel, and then enter the IP address.
IP by DNS Resolved Select this option if you do not
know the static IP address of the remote VPN device but
you do know its domain name. Then enter the remote VPN
device’s domain name on the Internet. The Router will
retrieve the IP address of the remote VPN device.
E-mail address Enter the e-mail address as an ID.
Dynamic IP + Domain Name(FQDN) Authentication
The Local Security Gateway will be a dynamic IP address,
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
the Router, the Router will work as a responder.
The domain name must match the Local Gateway of the
remote VPN device and can only be used for one tunnel
connection.
Domain Name Enter the domain name for authentication.
(Once used, you cannot use it again to create a new tunnel
connection.)
Dynamic IP + E-mail Addr.(USER FQDN) Authentication
The Remote Security Gateway will be a dynamic IP
address, so you do not need to enter the IP address. When
the Remote Security Gateway requests to create a tunnel
with the Router, the Router will work as a responder.
E-mail address Enter the e-mail address for
authentication.
Domain Name Enter the domain name as an ID (it cannot
be a real domain name on the Internet).
4-Port SSL/IPSec VPN Router
Remote Security Group Type
Select the Remote Security Group behind the Remote
Gateway that can use this VPN tunnel. Select the type
you want to use: IP, Subnet, or IP Range. Follow the
instructions for the type you want to use.
NOTE: The Remote Security Group Type you
select should match the Local Security Group
Type selected on the VPN device at the other
end of the tunnel.
After you have selected the Remote Security Group
Type, the settings available on this screen may change,
depending on which selection you have made.
IP
Only the computer with a specific IP address will be able
to access the tunnel.
IP address Enter the appropriate IP address.
37
Chapter 4
Advanced Configuration
Subnet
The default is Subnet. All computers on the remote subnet
will be able to access the tunnel.
IP address Enter the IP address.
Subnet Mask Enter the subnet mask. The default is
255.255.255.0.
IP Range
Specify a range of IP addresses within a subnet that will be
able to access the tunnel.
IP range Enter the range of IP addresses.
IPSec Setup
In order for any encryption to occur, the two ends of a
VPN tunnel must agree on the methods of encryption,
decryption, and authentication. This is done by sharing
a key to the encryption code. For key management, the
default mode is IKE with Preshared Key.
Keying Mode Select IKE with Preshared Key or Manual.
Both ends of a VPN tunnel must use the same mode of
key management. After you have selected the mode, the
settings available on this screen may change, depending
on the selection you have made. Follow the instructions
for the mode you want to use.
IKE with Preshared Key
IKE is an Internet Key Exchange protocol used to negotiate
key material for Security Association (SA). IKE uses the
Preshared Key to authenticate the remote IKE peer.
Phase 1 DH Group Phase 1 is used to create the SA. DH
(Diffie-Hellman) is a key exchange protocol used during
Phase 1 of the authentication process to establish preshared keys. There are three groups of different prime
key lengths. Group 1 is 768 bits, and Group 2 is 1,024 bits.
Group 5 is 1,536 bits. If network speed is preferred, select
Group 1. If network security is preferred, select Group 5.
Phase 1 Encryption Select a method of encryption: DES
(56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192 (192bit), or AES-256 (256-bit). The method determines the
length of the key used to encrypt or decrypt ESP packets.
AES-256 is recommended because it is the most secure.
Make sure both ends of the VPN tunnel use the same
encryption method.
Phase 1 Authentication Select a method of
authentication, MD5 or SHA. The authentication method
determines how the ESP packets are validated. MD5 is
a one-way hashing algorithm that produces a 128-bit
digest. SHA is a one-way hashing algorithm that produces
a 160-bit digest. SHA is recommended because it is more
secure. Make sure both ends of the VPN tunnel use the
same authentication method.
Phase 1 SA Life Time Configure the length of time a VPN
tunnel is active in Phase 1. The default value is 28800
seconds.
Perfect Forward Secrecy If the Perfect Forward Secrecy
(PFS) feature is enabled, IKE Phase 2 negotiation will
generate new key material for IP traffic encryption and
authentication, so hackers using brute force to break
encryption keys will not be able to obtain future IPSec
keys.
Phase 2 DH Group If the Perfect Forward Secrecy feature
is disabled, then no new keys will be generated, so you do
not need to set the Phase 2 DH Group (the key for Phase 2
will match the key in Phase 1).
There are three groups of different prime key lengths.
Group 1 is 768 bits, and Group 2 is 1,024 bits. Group 5 is
1,536 bits. If network speed is preferred, select Group 1.
If network security is preferred, select Group 5. You do
not have to use the same DH Group that you used for
Phase 1.
Phase 2 Encryption Phase 2 is used to create one or
more IPSec SAs, which are then used to key IPSec sessions.
Select a method of encryption: NULL, ES (56-bit), 3DES
(168-bit), AES-128 (128-bit), AES-192 (192-bit), or AES-256 (256-bit). It determines the length of the key used to
encrypt or decrypt ESP packets. AES-256 is recommended
because it is the most secure. Both ends of the VPN tunnel
must use the same Phase 2 Encryption setting.
Phase 2 Authentication Select a method of
authentication, NULL, MD5, or SHA. The authentication
method determines how the ESP packets are validated.
MD5 is a one-way hashing algorithm that produces a
128-bit digest. SHA is a one-way hashing algorithm that
produces a 160-bit digest. SHA is recommended because
it is more secure. Both ends of the VPN tunnel must use
the same Phase 2 Authentication setting.
Phase 2 SA Life Time Configure the length of time a VPN
tunnel is active in Phase 2. The default is 3600 seconds.
Preshared Key This specifies the pre-shared key used
to authenticate the remote IKE peer. Enter a key of
keyboard and hexadecimal characters, e.g., My_@123
or 4d795f40313233. This field allows a maximum of 30
characters and/or hexadecimal values. Both ends of
the VPN tunnel must use the same Preshared Key. It is
strongly recommended that you change the Preshared
Key periodically to maximize VPN security.
Manual
If you select Manual, you generate the key yourself, and
no key negotiation is needed. Manual key management is
used in small static environments or for troubleshooting
purposes.
4-Port SSL/IPSec VPN Router
38
Chapter 4
Advanced Configuration
the Authentication Key will be automatically completed
with zeroes until it has 40 hexadecimal values. Make sure
both ends of the VPN tunnel use the same Authentication
Key.
Advanced
Manual
Incoming and Outgoing SPI (Security Parameter
Index) SPI is carried in the ESP (Encapsulating Security
Payload Protocol) header and enables the receiver and
sender to select the SA, under which a packet should be
processed. Hexadecimal values is acceptable, and the
valid range is 100~ffffffff. Each tunnel must have a unique
Incoming SPI and Outgoing SPI. No two tunnels share the
same SPI. The Incoming SPI here must match the Outgoing
SPI value at the other end of the tunnel, and vice versa.
Encryption Select a method of encryption, DES or 3DES.
This determines the length of the key used to encrypt or
decrypt ESP packets. DES is 56-bit encryption and 3DES
is 168-bit encryption. 3DES is recommended because it is
more secure. Make sure both ends of the VPN tunnel use
the same encryption method.
Authentication Select a method of authentication, MD5
or SHA1. The Authentication method determines how
the ESP packets are validated. MD5 is a one-way hashing
algorithm that produces a 128-bit digest. SHA is a one-way
hashing algorithm that produces a 160-bit digest. SHA1
is recommended because it is more secure. Make sure
both ends of the VPN tunnel use the same authentication
method.
Encryption Key This field specifies a key used to encrypt
and decrypt IP traffic. Enter a key of hexadecimal values.
If DES is selected, the Encryption Key is 16-bit, which
requires 16 hexadecimal values. If you do not enter enough
hexadecimal values, then the rest of the Encryption
Key will be automatically completed with zeroes, so the
Encryption Key will be 16-bit. If 3DES is selected, the
Encryption Key is 48-bit, which requires 40 hexadecimal
values. If you do not enter enough hexadecimal values,
then the rest of the Encryption Key will be automatically
completed with zeroes, so the Encryption Key will be 48bit. Make sure both ends of the VPN tunnel use the same
Encryption Key.
Authentication Key This field specifies a key used to
authenticate IP traffic. Enter a key of hexadecimal values.
If MD5 is selected, the Authentication Key is 32-bit, which
requires 32 hexadecimal values. If you do not enter enough
hexadecimal values, then the rest of the Authentication Key
will be automatically completed with zeroes until it has 32
hexadecimal values. If SHA is selected, the Authentication
Key is 40-bit, which requires 40 hexadecimal values. If you
do not enter enough hexadecimal values, then the rest of
For most users, the settings on the VPN page should suffice;
however, the Router provides advanced IPSec settings for
advanced users using the IKE with Preshared Key mode.
Click Advanced to view the Advanced settings.
Advanced
Aggressive Mode There are two types of Phase 1
exchanges, Main Mode and Aggressive Mode.
Aggressive Mode requires half of the main mode messages
to be exchanged in Phase 1 of the SA exchange. If network
security is preferred, leave the Aggressive Mode check box
unchecked (Main Mode will be used). If network speed is
preferred, select Aggressive Mode. If you select one of
the Dynamic IP types for the Remote Security Gateway
Type setting, then Main Mode will be unavailable, so
Aggressive Mode will be used.
Compress (Support IP Payload Compression Protocol
(IP Comp)) IP Payload Compression is a protocol that
reduces the size of IP datagrams. Select this option if you
want the Router to propose compression when it initiates a
connection. If the responders reject this proposal, then the
Router will not implement compression. When the Router
works as a responder, it will always accept compression,
even if compression is not enabled.
connections. If a connection is dropped and detected, it
will be re-established immediately. Select this option to
use this feature.
NetBIOS Broadcast Select this option to allow NetBIOS
traffic to pass through the VPN tunnel. By default, the
Router blocks this traffic.
NAT Traversal This is enabled by default. Both the IPSec
initiator and responder must support the mechanism for
detecting the NAT router in the path and changing to a
new port, as defined in RFC 3947.
Dead Peer Detection (DPD) When DPD is enabled, the
Router will send periodic HELLO/ACK messages to check
the status of the VPN tunnel (this feature can be used only
when both peers or VPN devices of the VPN tunnel use the
DPD mechanism). Once a dead peer has been detected,
4-Port SSL/IPSec VPN Router
39
Chapter 4
the Router will disconnect the tunnel so the connection
can be re-established. Specify the interval between
HELLO/ACK messages (how often you want the messages
to be sent). DPD is enabled by default, and the default
interval is 10 seconds.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
IPSec VPN > VPN Pass Through
The VPN Pass Through screen allows you to enable or
disable passthrough for a variety of VPN methods.
Advanced Configuration
SSL VPN > Summary
Summary
Tunnel Used The number of VPN tunnels being used is
displayed.
Tunnel Available The number of available VPN tunnels
is displayed.
IPSec VPN > VPN Pass Through
VPN Pass Through
IPSec Pass Through Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. IPSec Pass Through is enabled by
default to allow IPSec tunnels to pass through the Router.
PPTP Pass Through Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Pass Through is
enabled by default.
L2TP Pass Through Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. L2TP Pass Through is enabled
by default.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
SSL VPN > Summary
Active Users
This section displays the active users using Virtual Passage
and administrative users logged into the SSL VPN Portal.
User Name This is the name of the user.
IP Address This is the IP address of the user.
Login Time This is the time stamp indicating when the
user logged in.
Status Displayed here is the user’s status, “Login” or
“Connected.” The status line will also display “Login” for
administrative users who logged in through the Portal
and did not create an SSL tunnel by Virtual Passage.
Logout Any administrative user can click the Trash Can
icon to terminate a user session and log the user out.
SSL VPN > Certificate Management
Manage the certificate used for securing communications
between the Router and VPN clients.
This screen displays general information about the SSL
VPN tunnels. The Router supports up to five SSL VPN
tunnels.
4-Port SSL/IPSec VPN Router
SSL VPN > Certificate Management
40
Chapter 4
Advanced Configuration
Generate New Certificate Click this option to generate
a new certificate. It will replace the Router’s existing
certificate.
Export Certificate for Administration The certificate for
administration holds the private key and should be stored
in a safe place as a backup. Select this option to store your
administration certificate as a file. The default filename is
RVL200_MMDD_HHMM.pem, which you can rename.
Follow the on-screen instructions to select the location
where you want to store your certificate. If you reset the
Router to its factory defaults, then you can import the
certificate and restore it on the Router.
Export Certificate for Client Select this option to store
your client certificate as a file. The default filename is
RVL200_MMDD_HHMM_Client.pem, which you can
rename. Follow the on-screen instructions to select the
location where you want to store your certificate.
Import Certificate Specify where your certificate
(X.509 certificate in a .pem file) is located. (This is the
file you previously saved using the Export Certificate for
Administration option.) Click Browse and follow the onscreen instructions. After you have selected the file, click
Import.
or LDAP. Follow the instructions for the type you want to
use.
RADIUS Server Address Enter the IP address or domain
name of the RADIUS server.
Secret Password If required by the RADIUS server, enter
an authentication secret password.
Proceed to the “Edit User” section.
NT Domain
Existing Certificate The filename of the current certificate
is displayed.
SSL VPN > User Management
Define users for your SSL VPN tunnels.
SSL VPN > User Management
User Management
Edit Group
NT Domain
NT Server Address Enter the IP address or domain name
of the server. (The Router does support Linux Samba
Server Authentication.)
NT Domain Name Enter the NT authentication domain.
This is the domain name configured on the Windows
authentication server or Linux Samba authentication
server for network authentication.
Proceed to the “Edit User” section.
Active Directory
Active Directory
Server Address Enter the IP address or domain name of
the Active Directory server.
Authentication Type
Select the type you want to use: Local User Database,
RADIUS - PAP, RADIUS - CHAP, RADIUS - MSCHAP,
RADIUS - MSCHAPV2, NT Domain, Active Directory,
4-Port SSL/IPSec VPN Router
Active Directory Domain Enter the Active Directory
domain name.
41
Chapter 4
NOTE: If your users are unable to connect via
Active Directory, verify the following:
The time settings between the Active
1.
Directory server and the Router must be
synchronized. Kerberos authentication, used
by Active Directory to authenticate clients,
permits a maximum of a 15-minute time
difference between the Windows server and
client (the Router).
Make sure your Windows server is configured
2.
for Active Directory authentication. If you
are using a Windows NT 4.0 server, then
your server only supports NT Domain
authentication. Windows 2000 and 2003
servers are also configured for NT Domain
authentication to support legacy Windows
clients.
Proceed to the “Edit User” section.
LDAP
Advanced Configuration
Add a User to the Local User Database
Configure the following settings:
User Name Enter the name the user will use to log into
the SSL VPN Portal.
User Type For users with Local User Database
authentication, select User or Administrator. User types
can only access the SSL VPN Portal, and Administrator
types can access the Router’s web-based utility.
Password For users with Local User Database
authentication, enter the user’s password.
LDAP
Server Address Enter the IP address or domain name of
the server.
LDAP BaseDN* Enter the search base for LDAP queries.
This is an example of a search base string: CN=Users,DC=
yourdomain,DC=com. (Do not use quotation marks in this
field.)
Proceed to the “Edit User” section.
Edit User
A list of users is displayed here.
User Name This is the name of the user.
User Type This is the type of user, User or Administrator.
Inactivity Timeout This is the number of idle minutes
permitted before a session will time out.
Config Click Edit to change the user’s settings on the
User Management screen.
Confirm Password For users with Local User Database
authentication, re-enter the user’s password.
Inactivity Timeout Enter the number of idle minutes
permitted before the session times out and the login
screen appears. The default for User type is 0, which
disables the Inactivity Timeout feature. The default for
Administrator type is 10 minutes.
Click Save Settings to save your changes, or click Exit to
return to the User Management screen.
On the User Management screen, click Save Settings
to save your changes, or click Cancel Changes to undo
them.
SSL VPN > Virtual Passage
Define the IP address range for incoming Virtual Passage
clients and establish an SSL VPN tunnel by Virtual Passage.
Virtual Passage is a software application that enables
remote users to securely connect to a remote network, as
if they were on the local network.
To add a new user, click Add User. (The maximum number
of users is 128.) The User Management screen appears.
4-Port SSL/IPSec VPN Router
42
Chapter 4
SSL VPN > Virtual Passage
Virtual Passage
Advanced Configuration
SNMP > Global Parameters
Configure the parameters to define the SNMP Engine ID
and notification.
Client Address Range
Define the range of IP addresses to assign to incoming
Virtual Passage clients. The default is 192.168.1.200
to 192.168.1.210. The Router can support up to five
concurrent active users.
Range Start Enter the starting IP address of the IP address
range.
Range End Enter the ending IP address of the IP address
range.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
SSL VPN Portal
Click Access Portal to connect to the SSL VPN Portal
screen. Then you will be able to establish an SSL VPN tunnel
by Virtual Passage. (For instructions on how to install and
use the Virtual Passage Client, refer to “Appendix B: Virtual
Passage SSL VPN Client.”)
SNMP > Global Parameters
Global Parameters
Enable SNMP To use SNMP, select this option.
SNMPv3
Local Engine ID If you want to manually generate the
local engine ID, enter the values in text form and then click
Save Settings. The Router will automatically generate an
engine ID in hexadecimal characters.
Use Default If you want the Router to generate engine
IDs based on the device MAC address, select this option.
The engine IDs are based on the following:
First Four Octets
First bit = 1
•
Rest of the bits = IANA Enterprise number (To locate
•
the IANA Enterprise number, use the show SNMP
command via a command line interface.)
Fifth Octet
Set to 4 to indicate that the engine ID format is text.
4-Port SSL/IPSec VPN Router
SSL VPN Portal
Last Twelve Octets
These are the hexadecimal characters of the device MAC
address.
Notifications
SNMP Notifications If you want the Router to send SNMP
notifications, select this option.
Authentication Failure Notifications If you want the
Router to send authentication failure notifications, select
this option.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
43
Chapter 4
SNMP > Views
Configure this screen to allow or deny access to SNMP
features.
SNMP > Views
Views
Advanced Configuration
IP-MB 1.3.1.2.1.48
•
IF-MIB 1.3.6.1.2.1.31
•
TCP-MIB 1.3.6.1.2.1.49
•
UDP-MIB 1.3.6.1.2.1.50
•
SNMPv2-MIB 1.3.6.1.6.3.1
•
RCF1213-MIB 1.3.6.1.2.1.1
•
SNMP-VIEW-BASED-ACM-MIB 1.3.6.1.6.3.16
•
SNMP-COMMUNITY-MIB 1.3.6.1.6.3.18
•
SNMP-FRAMEWORK-MIB 1.3.6.1.6.3.10
•
SNMP-MPD-MIB 1.3.6.1.6.3.11
•
SNMP-USER-BASED-SM-MIB 1.3.6.1.6.3.15
•
SNMP-TARGET-MIB 1.3.1.6.3.12
•
LINKSYS-MIB 1.3.6.1.4.1.3955
•
View Type Select included if the defined OID will be
included in the selected SNMP view. Select excluded if
the defined OID will be excluded.
View Table
View Name Select the appropriate view name. There are
two default views:
Default
This displays the default SNMP views for read and
read/write views, including the following MIB OIDs:
This displays the default SNMP view for administrator
views. It does not block any subtree OID.
New View Name Enter a new view name.
SubTree ID Tree Linksys supports user-defined OIDs.
These are some of the common MIB OIDs:
Click Add to List, and configure as many entries as you
would like, up to a maximum of 20. To delete an entry,
select it and click Delete.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
SNMP > Group Profile
Define the SNMP groups and their features, including
SNMP version usage and access rights.
SNMP > Group Profile
Group Profile
Group Table
Group Name Enter a name for the group, up to 30
characters.
4-Port SSL/IPSec VPN Router
44
Chapter 4
Advanced Configuration
Security Model Select the version of SNMP the group
uses: SNMPv1, SNMPv2, or SNMPv3.
Security Level This option is available if SNMPv3 is
selected for the Security Model. Select No Authentication
if no authentication or privacy security levels are
specified. Select Authentication if SNMP message origins
are authenticated. Select Privacy SNMP messages are
authenticated and encrypted.
Operation Select Read if you want the group to have
read-only access to the assigned SNMP view; the group
cannot change the assigned SNMP view. Then select the
appropriate SNMP view.
Select Write if you want the group to have read/write
access to the assigned SNMP view; the group can change
the assigned SNMP view. Then select the appropriate
SNMP view.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 15. To delete an entry,
select it and click Delete.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Authentication Method Select the appropriate method:
MD5 Password, SHA1 Password, MD5 Key, or SHA1
Key.
Password If MD5 or SHA1 Password is selected, then
only the password will be used for authentication. Enter
the password. Its length must be equal to or larger than
8 bytes.
Key If MD5 or SHA1 Key is selected, then the authentication
key and privacy key will be used for authentication. Enter
the authentication key and privacy key. The length of the
MD5 authentication key must be 16 bytes. The length of
the SHA authentication key must be 20 bytes. The length
of the privacy key must be 8 bytes.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
SNMP > Communities
Define the SNMPv1/v2c users.
SNMP > Group Membership
Assign users to specific SNMP groups.
SNMP > Group Membership
Group Membership
Membership Table
User Name Enter a name for the user.
Engine ID Select Local if the user is connected to a local
SNMP entity.
Select Remote if the user is connect to a remote SNMP
entity. Then enter the remote engine ID.
Group Name Select a group for the user.
4-Port SSL/IPSec VPN Router
SNMP > Communities
Communities
SNMP Management Station Select the top option to
specify an IP address. Then enter the IP address of this
community name.
Select All to specify all IP addresses for all management
stations.
Community String Enter the password used to
authenticate the management station to the Router.
45
Chapter 4
Select how you want to define the access control of this
community.
Basic
Access Mode This allows both v1 and v2c operation
requests. Select Read Only if you want the user to have
read-only access to the parameters of the MIB tree with
respect to the view name.
Select Read Write if you want the user to have read/write
access to the parameters of the MIB tree with respect to
the view name.
Select SNMP Admin if you want the user to have full
access to parameters of the MIB tree.
View Name Select View Name and then select the
appropriate MIB OID. If View Name is not selected, the
option, default, will be assigned.
Advanced
Advanced Configuration
Group Name Select a group, either v1 or v2c, to assign to
this community.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 15.
Base Table
The basic entries are listed. To delete an entry, select it and
click Delete.
Advanced Table
The advanced entries are listed. To delete an entry, select
it and click Delete.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
SNMP > Notification Recipient
Define the types and frequencies of the notifications.
SNMP > Notification Recipient
Notification Recipient
Recipient IP Enter the IP address that will receive the
SNMP traps.
Notification Type Select the appropriate type, Trap or
Inform. An Inform type requires response, while a Trap
type does not.
UDP Port Enter the destination port number. The default
is 162.
Timeout If you selected Inform as the Notification Type,
then enter the number of seconds the Router waits before
re-sending an inform request. The default is 15 seconds.
Retries If you selected Inform as the Notification Type,
then enter the number of tries you want the Router to resend an inform request. The default is 3.
SNMPv1,2
Select this option if you want to use a v1 or v2 trap. If you
selected Inform as the Notification type, this option will
not be available (v1 does not use inform requests).
4-Port SSL/IPSec VPN Router
Then configure the following:
Community String Enter the password used to
authenticate the management station to the Router.
Notification Version Select the appropriate version,
SNMPv1 or SNMPv2.
46
Chapter 4
Advanced Configuration
SNMPv3
Select this option if you want to use SNMPv3. Then
configure the following:
User Name Enter the name of the user who receives
SNMP notifications.
Security Level Select No Authentication if no
authentication or privacy security levels are specified.
Select Authentication if SNMP message origins are
authenticated. Select Privacy SNMP messages are
authenticated and encrypted.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 10.
SNMPv1,2 Table
The SNMPv1,2 entries are listed. To delete an entry, select
it and click Delete.
SNMPv3 Table
The SNMPv3 entries are listed. To delete an entry, select it
and click Delete.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
System Log
Syslog
Syslog is a standard protocol used to capture information
about network activity. The Router supports this protocol
and can send its activity logs to an external server.
Enable Syslog Select this option to enable the Router’s
Syslog feature.
Syslog Server In addition to the standard event log,
the Router can send a detailed log to an external Syslog
server. The Router’s Syslog captures all log activities and
includes this information about all data transmissions:
every connection source and destination IP address, IP
service, and number of bytes transferred. Enter the Syslog
server name or IP address. Click Save Settings to save
your changes, and then restart the Router for the changes
to take effect.
E-mail
You may want logs or alert messages to be e-mailed to
you. If so, then configure the E-mail settings.
Enable E-Mail Alert Select this option to enable the
Router’s E-Mail Alert feature.
Log > System Log
Configure the Router’s log settings, so you can specify
how you want its activity logs handled.
Log > System Log
Mail Server If you want any log or alert information
e-mailed to you, then enter the name or numerical IP
address of your SMTP server. Your ISP can provide you
with this information.
Send E-mail to Enter the e-mail address that will
receive your log files. If you do not want copies of the log
information e-mailed to you, then leave this field blank.
Enable E-Mail Authentication Select this option to
enable the Router’s E-Mail Authentication feature.
User Name Enter the user name for authentication.
Password Enter the password for authentication.
Log Queue Length You can designate the length of the
log that will be e-mailed to you. The default is 50 entries,
so unless you change this setting, the Router will e-mail
the log to you when there are more than 50 log entries.
Log Time Threshold You can designate how often the
log will be e-mailed to you. The default is 10 minutes, so
unless you change this setting, the Router will e-mail the
log to you every 10 minutes.
The Router will e-mail the log every time the Log Queue
Length or Log Time Threshold is reached.
E-mail Log Sorting Logs have different severity levels.
The higher the severity level, the more critical the log is
(the highest level is Severity0_Emergency). Select the
minimum severity level of logs that are e-mailed. Log
events with equal or higher severity level will also be
4-Port SSL/IPSec VPN Router
47
Chapter 4
Advanced Configuration
e-mailed at the same time. The default is Severity0_
Emergency.
Click E-mail Log Now to immediately send the log to the
address in the Send E-mail to field.
Log Setting
Alert Log
Syn Flooding Select this option if you want Syn Flooding
events to trigger an alert.
IP Spoofing Select this option if you want IP Spoofing
events to trigger an alert.
Win Nuke Select this option if you want Win Nuke events
to trigger an alert.
Ping of Death Select this option if you want Ping of
Death events to trigger an alert.
Unauthorized Login Attempt If this option is enabled,
Unauthorized Login Attempt events trigger an alert. This
option is enabled by default.
General Log
Deny Policies Select this option if you do not want to
include log events from Deny rules on the Firewall > Access
Rule screen. Log events from Deny rules will be logged
separately from Deny Policies if the option, log packets
match this rule, is selected.
Allow Policies Select this option if you want to include
log events from Allow rules on the Firewall > Access Rule
screen. Log events from Allow rules will be logged whether
or not the option, log packets match this rule, is selected.
Authorized Login If this option is enabled, Authorized
Login events are included. This option is enabled by
default.
View System Log To view logs, click this option. The
System Log screen appears.
Time The time of each log event is displayed. You can sort
each log by time sequence.
Event-Type The type of log event is displayed.
Message The message associated with each log event is
displayed.
To update a log, click Refresh. To clear a log, click Clear. To
exit the System Log screen and return to the Log > System
Log screen, click Close.
Outgoing Log Table To view the outgoing packet
information including LAN IP, Destination URL/IP and
Service/Port number, click this option.
Outgoing Log Table
To update the on-screen, click Refresh. To exit the
Outgoing Log Table screen and return to the Log > System
Log screen, click Close.
Incoming Log Table To view the incoming packet
information including Source IP and Destination Port
number, click this option.
Incoming Log Table
To update the on-screen, click Refresh. To exit the Incoming Log Table screen and return to the Log > System Log screen,
click Close.
Clear Log Now To clear your log without e-mailing it,
click this option. Only use this option if you are willing to
lose your log information.
Click Save Settings to save your changes, or click Cancel Changes to undo them.
System Log
Current Time The time of the Router is displayed.
Select the log you wish to view: ALL, System Log, Firewall
Log, IPSec Log, or SSL Log. The All log displays a log of
all activities. The System Log displays a list of cold and
warm starts, web login successes and failures, and packet
filtering policies. The Firewall Log displays all activities
regarding the Router’s firewall. The IPSec Log shows
information about IPSec VPN tunnel activity. The SSL Log
shows information about SSL VPN tunnel activity.
Select the severity level of log events you wish to view.
4-Port SSL/IPSec VPN Router
Log > System Statistics
This screen displays statistics about all of the Router’s
ports (LAN and WAN ports). For each port, the following
statistics are listed: Device Name, Status, IP Address, MAC
Address, Subnet Mask, Default Gateway, DNS, number of
Received Packets, number of Sent Packets, number of Total
Packets, number of Received Bytes, number of Sent Bytes,
number of Total Bytes, number of Error Packets Received,
and number of Dropped Packets Received.
48
Chapter 4
Log > System Statistics
Click Refresh to update the statistics.
Wizard
Use this tab to access two Setup Wizards, the Basic Setup
Wizard and the Access Rule Setup Wizard. Run the Basic
Setup Wizard to set up the Router for your Internet
connection(s). Run the Access Rule Setup Wizard to set up
the security policy for the Router.
Advanced Configuration
Your Internet Service Provider (ISP) may require you
2.
to use a host and domain name for your Internet
connection. If your ISP requires them, complete the
Host Name and Domain Name fields; otherwise leave
these blank. Click Next to continue. Click Exit if you
want to exit the Setup Wizard.
Host and Domain Name
Basic Setup
Click Launch Now to run the Basic Setup Wizard.1.
Wizard
Select the WAN (or Internet) Connection Type for the
3.
WAN port. Select the appropriate connection type:
Obtain an IP automatically, Static IP, or PPPoE. Click
Next to continue. Click Previous if you want to return
to the previous screen. Click Exit if you want to exit the
Setup Wizard.
WAN Connection Type
4-Port SSL/IPSec VPN Router
49
Chapter 4
Advanced Configuration
Depending on which connection type you have
4.
selected, the appropriate screen will appear. Follow
the instructions for the appropriate connection type:
Obtain an IP automatically
If you want to use the ISP’s DNS server, select Use
DNS Server provided by ISP (default). If you want to
designate a specific DNS server IP address, select Use
the Following DNS Server Addresses, and enter the
DNS server IP addresses you want to use (you must
enter at least one).
Click Next to continue, and proceed to step 5. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.
On the DNS Servers screen, enter the DNS server IP
addresses you want to use (you must enter at least
one).
Click Next to continue, and proceed to step 5. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.
DNS Servers
PPPoE
Obtain an IP Automatically
Static IP
Complete the Static IP, Subnet Mask, and Default
Gateway fields with the settings provided by your ISP.
Click Next to continue.
Click Previous if you want to return to the previous
screen. Click Exit if you want to exit the Setup Wizard.
Static IP
Complete the User Name and Password fields with the
information provided by your ISP.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
PPPoE
Select Connect on demand or Keep alive. If you select
the Connect on demand option, the connection will
be disconnected after a specified period of inactivity
(Max Idle Time). If you have been disconnected due
to inactivity, Connect on Demand enables the Router
to automatically re-establish your connection as soon
as you attempt to access the Internet again. Enter the
number of minutes you want to have elapsed before
4-Port SSL/IPSec VPN Router
50
Chapter 4
Advanced Configuration
your Internet access disconnects. The default is 5
minutes.
If you select the Keep alive option, the Router will keep
the connection alive by sending out a few data packets
periodically, so your ISP thinks that the connection is
still active. This option keeps your connection active
indefinitely, even when it sits idle. The default Redial
Period is 30 seconds.
Click Next to continue, and proceed to step 5. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.
This screen explains the Access Rules, including the
2.
Router’s Default Rules. Click Next to continue. Click
Exit if you want to exit the Setup Wizard.
Access Rules Policy
From the drop-down menu, select Allow or Deny
3.
depending on the intent of the Access Rule.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
Connect on Demand or Keep Alive
If you want to save your changes, click Save Settings.
5.
Click Previous if you want to return to the previous
screen. Click Exit if you want to exit the Setup Wizard.
Save Settings
Access Rule Setup
Click Launch Now to run the Access Rule Setup
1.
Wizard.
Select the Action
4-Port SSL/IPSec VPN Router
51
Chapter 4
Select the service you want from the Service pull-down
4.
menu.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
Advanced Configuration
Select the appropriate Source Interface: LAN, WAN, or
6.
Any from the Interface pull-down menu.
Select the Source IP address(es) for this Access Rule. If it
can be any IP address, select Any. If it is one IP address,
select Single and enter the IP address in the Source IP
fields. If it is a range of IP addresses, select Range, and
enter the IP addresses in the Source IP fields.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
Select the Service
For this service, you can select whether or not you want
5.
the Router to keep a log tracking this type of activity.
To keep a log, select Log packets match this access rule. If you do not want a log, select Not log.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
Select the Log
Select the Source
Select the Destination IP address(es) for this Access
7.
Rule. If it can be any IP address, select Any. If it is one IP
address, select Single and enter the IP address in the
Destination IP fields. If it is a range of IP addresses, select
Range, and enter the IP addresses in the Destination IP
fields.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.
4-Port SSL/IPSec VPN Router
Select the Destination
52
Chapter 4
Decide when you want this Access Rule to be enforced.
8.
Select Always if you want the Access Rule to be always
enforced. Click Next to continue. Click Previous if you
want to return to the previous screen. Click Exit if you
want to exit the Setup Wizard.
Advanced Configuration
A screen appears to notify you that the settings have
10.
been saved. If you want to add another Access Rule,
click OK, and the first screen of the Access Rule Setup
Wizard will appear. If you want to exit the Access Rule
Setup Wizard, click Cancel, and the Firewall > Access Rules screen will appear.
Settings are Successful
Support
Access a variety of resources on the Support page of the
Linksys website, www.linksys.com. You must have an
active Internet connection before you can visit the Linksys
website.
When It Works
Select Scheduling if you want to specify when the
Access Rule should be in effect. Click Next to continue.
A new screen appears. Decide what times and which
days of the week the Access Rule should be enforced.
Then enter the hours and minutes in 24-hour format,
and select the appropriate days of the week. Click
Next to continue. Click Previous if you want to return
to the previous screen. Click Exit if you want to exit the
Setup Wizard.
If you want to save your changes, click Save Settings.
9.
Click Previous if you want to return to the previous
screen. Click Exit if you want to exit the Setup Wizard.
Support
Manual
If you want the latest version of this User Guide, follow
these instructions:
Click the On Line Manual.
1.
The Support page of the Linksys website appears. Click
2.
the Support tab and then Downloads.
Select RVL200 - 4-Port SSL/IPSec VPN Router from
3.
the drop-down menu.
Click Downloads for this Product.
4.
4-Port SSL/IPSec VPN Router
Save Settings
Click User Guide.
5.
Linksys Web Site
Click Linksys Web Site, and the Support page of the
Linksys website appears.
Logout
The Logout tab is located on the upper right-hand corner
of the screen. Click this tab to end the management
53
Chapter 4
session. (If you end the session, you will need to re-enter
your User Name and Password to log in and then manage
the Router.)
After you click the Logout tab, a Warning screen appears. It
will ask you to confirm that you want to delete the History
Item for the Router. (The Web Cache Cleaner will prompt
you to delete all temporary Internet files, cookies, and
browser history during logout.) Click Yes.
Logout
Advanced Configuration
4-Port SSL/IPSec VPN Router
54
Appendix A
Troubleshooting
Appendix A:
Troubleshooting
The rmware upgrade has failed.
A firmware upgrade takes approximately ten minutes. An
error may occur if you powered off the Router, pressed the
Reset button, closed the System Management > Firmware Upgrade screen, or disconnected the computer from the
Router during the firmware upgrade.
If the firmware upgrade failed, repeat the firmware
upgrade procedure using the System Management > Firmware Upgrade screen of the web-based utility. Refer to
“Appendix O: Firmware Upgrade” for details.
If the Diag LED continues to flash, the firmware image is
damaged. Use the TFTP utility to upgrade the firmware.
You can download the TFTP utility at www.linksys.com.
Your computer cannot connect to the Internet.
Follow these instructions until your computer can connect
to the Internet:
The Router does not have a coaxial port for the cable
connection.
The Router does not replace your modem. You still need
your cable modem in order to use the Router. Connect your
cable connection to the cable modem, insert the setup
CD into your computer, and then follow the on-screen
instructions.
WEB: If your questions are not addressed here,
refer to the Linksys website, www.linksys.com.
Make sure that the Router is powered on. The Power
•
LED should be green and not flashing.
If the Power LED is flashing, then power off all of
•
your network devices, including the modem, Router,
and computers. Then power on each device in the
following order:
Cable or DSL modem
1.
Router
2.
Computer
3.
Check the cable connections. The computer should
•
be connected to one of the ports numbered 1-4 on
the Router, and the modem must be connected to the
Internet port on the Router.
The DSL telephone line does not t into the Router’s
Internet port.
The Router does not replace your modem. You still need
your DSL modem in order to use the Router. Connect
the telephone line to the DSL modem, insert the setup
CD into your computer, and then follow the on-screen
instructions.
4-Port SSL/IPSec VPN Router
55
Appendix B
Appendix B:
Virtual Passage SSL VPN
Client
Overview
The Router’s SSL VPN Portal includes an ActiveX-based VPN
client that provides full network connectivity for Windows
users. This client, called the Virtual Passage Client, lets you
remotely access the Router’s network through a secure
connection.
Virtual Passage SSL VPN Client
This chapter discusses the Virtual Passage Client for
Windows, Mac, and Linux Operating System (OS) users.
Before You Begin (Windows OS)
The Router’s web-based utility and SSL VPN Portal
support Internet Explorer 6.0 (or higher) and Netscape
Communicator 8.0 (or higher) running in a Windows
environment.
To configure the SSL VPN software, your web browser
must have SSL, JavaScript, ActiveX, and cookies enabled
(these settings are enabled by default). If the settings are
already enabled, proceed to the next section, “Make the
SSL VPN Portal a Trusted Site”. If the settings are disabled,
you should enable them before configuring the Router.
Proceed to the instructions for your web browser.
Internet Explorer 6.0 or Higher
Open Internet Explorer.
1.
Click Tools.
2.
Click Internet Options.
3.
Click the Advanced tab.
4.
Select Use SSL 2.0 and Use SSL 3.0.
5.
Internet Explorer > Internet Options > Advanced
Click OK.
6.
Click the Security tab.
7.
Click Custom Level.
8.
Select Enable for the Active scripting, Allow paste
9.
operations via script, and Scripting of Java applets
settings.
In the Master Settings section, click I’m Not Sure.
6.
Click Allow cookies.
7.
Click Enable JavaScript.
8.
Click Advanced.
9.
Click Enable ActiveX.
10.
Make the SSL VPN Portal a Trusted Site
(Windows OS)
Most web browsers support multiple security zones with
different permission levels. Trusted sites have a lower
security setting that will allow the Java and ActiveX
content to work properly. If your web browser’s security
settings are set to High, you may need to add the SSL VPN
Portal to your browser’s list of trusted sites.
The following instructions are provided for Internet
Explorer. For Netscape Communicator, refer to its Help
section for details.
Open Internet Explorer.
1.
Go to the SSL VPN Portal as a trusted site.
2.
Press Alt + D to select the SSL VPN Portal address, and
3.
press Ctrl + C to copy it to the Windows Clipboard.
Click Tools.
4.
Click Internet Options.
5.
Click the Security tab.
6.
Click Trusted sites.
7.
Netscape Communicator > Options > Site Controls > Web Features
Click OK.
11.
Under Options, click Advanced.
12.
Click Security.
13.
4-Port SSL/IPSec VPN Router
Click the Sites button.
8.
The Trusted sites screen appears. In the Add this Web
9.
site to the zone field, press Ctrl + V to paste in the SSL
VPN Portal web address.
Click Add.
10.
Click OK.
11.
Click OK again.
12.
57
Appendix B
Login for the SSL VPN Portal (Windows OS)
Follow these instructions to log in:
Enter the IP address of the Router, https://<WAN IP
1.
address of the Router>, in your web browser. Then
press the Enter key.
A login screen appears. Enter your user name in the
2.
User Name field, and enter your password in the
Password field.
Click Login.
3.
Virtual Passage SSL VPN Client
Click the Unlock icon.
1.
Click the Unlock Icon
After you have logged in, you will be asked to install
2.
the Web Cache Cleaner application. This will prompt
any user of the Router to delete all temporary Internet
files, cookies, and browser history when the user logs
out or closes the web browser window. (The ActiveX
web cache control will be ignored by web browsers
that do not support ActiveX.)
SSL VPN Portal Login Screen
If your user type is Administrator, then you can access the
web-based utility. If your user type is User, then you can
use Virtual Passage only.
Installation of the Virtual Passage Client
(Windows OS)
The first time you create an SSL VPN tunnel, you have to
install the Virtual Passage Client on your computer.
Before you begin, make sure you have administrative
rights on your computer. Then follow these instructions:
Click the link to install the Web Cache Cleaner.
Click to Install the Web Cache Cleaner
4-Port SSL/IPSec VPN Router
58
Appendix B
On the Security Warning screen, click Yes.
3.
Click Yes to Install
A second Security Warning screen asks you if you want
4.
to install XTunnel, the Virtual Passage application.
Click Install.
Virtual Passage SSL VPN Client
After the software is installed, you will be notified that the
SSL VPN tunnel has been established.
SSL VPN Tunnel Established
An icon appears in the system tray of your computer.
Click Install
The Hardware Installation screen asks you if you want
5.
to continue with the installation.
Click Continue Anyway.
Click Continue Anyway
The Web Cache Cleaner and XTunnel are installed in
C:\\WINDOWS\Downloaded Program Files.
Installation Complete
System Tray Icon
When you right-click the icon, you have three options:
Virtual Passage Menu
Virtual Passage Status Click Virtual Passage Status to
display a status screen indicating the connection status,
interfaces, activity, and status message. Click Disconnect
to end your session, or click Close to exit this screen.
Disconnect and Uninstall Virtual Passage to end the
session remove the Virtual Passage application from your
computer.
Logout of the SSL VPN Portal (Windows OS)
When you log out, you will see a Warning screen. It will ask
you to confirm that you want to delete the History Item
for the Router. (The Web Cache Cleaner will prompt you
to delete all temporary Internet files, cookies, and browser
history during logout.) Click Yes.
4-Port SSL/IPSec VPN Router
Click Yes to Delete History
59
Appendix B
Windows Vista Usage
If you use Windows Vista to establish an SSL VPN
connection and do not disable the User Account Control
(UAC) feature, an error message will display, indicating
that Virtual Passage was not installed.
Vista Error Message
To install Virtual Passage, follow these instructions:
Click Start.
1.
Select All Programs > Control Panel > User Accounts
2.
> Turn User Accounts On or Off.
Deselect (remove the check mark from) User Account
3.
Control (UAC) to help protect your computer.
Virtual Passage SSL VPN Client
Click Login.
3.
SSL VPN Portal Login Screen
If your user type is Administrator, then you can access the
web-based utility. If your user type is User, then you can
use Virtual Passage only.
Deselect Use User Account Control (UAC)
Click OK.
4.
Restart your computer.
5.
Establish the SSL VPN connection again.
6.
NOTE: After you end the SSL VPN connection,
Linksys recommends that you enable the User
Account Control (UAC) feature.
Login for the SSL VPN Portal (Mac OS X)
Follow these instructions to log in:
Enter the IP address of the Router, https://<WAN IP
1.
address of the Router>, in your web browser. Then
press the Enter key.
A login screen appears. Enter your user name in the
2.
User Name field, and enter your password in the
Password field.
Installation of the Virtual Passage Client
(Mac OS X)
The first time you create an SSL VPN tunnel, you have to
install the Virtual Passage Client on your computer.
Before you begin, make sure you have administrative
rights on your computer. Then follow these instructions:
Click the Unlock icon.
1.
Click the Unlock Icon
4-Port SSL/IPSec VPN Router
60
Appendix B
A screen may appear indicating that the certificate
2.
cannot be verified. Linksys has confirmed that the
certificate is valid.
Click Continue.
Click to Continue
On the Warning screen, click Run.
3.
Virtual Passage SSL VPN Client
NOTE: If you used Safari or Firefox to establish
the SSL VPN connection through HTTP and want
to switch to HTTPS to re-establish the SSL VPN
connection, you must close your web browser
before switching to HTTPS.
Removal of the Virtual Passage Client (Mac
OS X)
To remove the Virtual Passage Client, follow these
instructions:
In the sentence, “Click here to Uninstall VPN Tunnel
1.
client”, click the word here.
Click Run
Enter your password for OS X.
4.
To install the Virtual Passage Client, click OK.
Enter Your Password
After the software is installed, you will be notified that the
SSL VPN tunnel has been established.
Click the Word “Here”
Enter your password for OS X.
2.
To uninstall the Virtual Passage Client, click OK.
Enter Your Password
After the software is removed, you will be notified.
3.
Click OK.
SSL VPN Tunnel Established
To end the SSL VPN connection, click Disconnect.
4-Port SSL/IPSec VPN Router
Click OK
61
Appendix B
Virtual Passage SSL VPN Client
Before You Begin (Linux OS)
Make sure you have administrative rights on your
computer. Then install the freeware, Java Runtime
Environment (JRE), on your computer. To download the
freeware, visit Java-related websites. If you do not install
JRE, a warning message will appear, and you cannot install
the Virtual Passage Client.
Warning Message
Login for the SSL VPN Portal (Linux OS)
Follow these instructions to log in:
Enter the IP address of the Router, https://<WAN IP
1.
address of the Router>, in your web browser. Then
press the Enter key.
A login screen appears. Enter your user name in the
2.
User Name field, and enter your password in the
Password field.
Before you begin, make sure you have administrative
rights on your computer. Then follow these instructions:
Click the Unlock icon.
1.
Click the Unlock Icon
A screen may appear indicating that the digital
2.
signature cannot be verified. Linksys has confirmed
that the digital signature is valid.
Click Run.
Click Login.
3.
SSL VPN Portal Login Screen
If your user type is Administrator, then you can access the
web-based utility. If your user type is User, then you can
use Virtual Passage only.
Installation of the Virtual Passage Client
(Linux OS)
Click Run
A screen may appear indicating that the certificate
3.
cannot be verified. Linksys has confirmed that the
certificate is valid.
Click Yes.
Click Yes
The first time you create an SSL VPN tunnel, you have to
install the Virtual Passage Client on your computer.
4-Port SSL/IPSec VPN Router
62
Appendix B
On the Warning screen, click Run.
4.
Virtual Passage SSL VPN Client
After the software is removed, you will be notified.
2.
Click OK.
Click Run
After the software is installed, you will be notified that the
SSL VPN tunnel has been established.
SSL VPN Tunnel Established
To end the SSL VPN connection, click Disconnect.
Removal of the Virtual Passage Client
(Linux OS)
To remove the Virtual Passage Client, follow these
instructions:
Click OK
In the sentence, “Click here to Uninstall VPN Tunnel
1.
client”, click the word here.
Click the Word “Here”
4-Port SSL/IPSec VPN Router
63
Appendix C
Appendix C:
Bandwidth Management
Overview
This appendix explains how to ensure Quality of Service
(QoS) on Vonage Voice over Internet Protocol (VoIP)
phone service. This example uses Vonage; however, similar
instructions will apply to other VoIP services.
Creation of New Services
Bandwidth Management
Create two new services, Vonage VoIP and
Vonage 2.
Visit Vonage’s website at http://www.vonage.com.
1.
Find out the ports used for Vonage VoIP service.
Access the Router’s web-based utility. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the QoS tab.
3.
On the Bandwidth Management screen, click Service
4.
Management.
Add Vonage VoIP Service
From the Protocol drop-down menu, select the
6.
protocol the VoIP service uses. For example, some VoIP
devices use UDP.
Enter its SIP port range in the Port Range fields. For
7.
example, you can set the Port Range to 5060 to 5070
to make sure that all active ports are covered.
Click Add to List.
8.
Add a second service. Enter a name, such as Vonage 2,
9.
in the Service Name field.
QoS > Bandwidth Management
On the Service Management screen, enter a name, such
5.
as Vonage VoIP, in the Service Name field.
4-Port SSL/IPSec VPN Router
Add Vonage 2 Service
From the Protocol drop-down menu, select UDP.
10.
Enter the RTP port range in the Port Range fields. These
11.
are required for both incoming and outgoing traffic.
For example, you can set the Port Range to 10000 to
25000 to make sure that all active ports are covered.
Click Add to List.
12.
Click Apply to save your changes.
13.
64
Appendix C
Creation of New Bandwidth Management
Rules
Create four new rules: Vonage VoIP (Upstream), Vonage
VoIP (Downstream), Vonage 2 (Upstream), and Vonage 2
(Downstream).
On the Bandwidth Management screen, select Vonage
1.
VoIP from the Service drop-down menu.
Enter the IP address or range you need to control. To
2.
include all internal IP addresses, keep the default, 0.
From the Direction drop-down menu, select Upstream
3.
for outbound traffic.
In the Min. Rate field, enter the minimum rate for the
4.
guaranteed bandwidth. For example, you can set a
minimum rate of 40 kbit/sec.
In the Max. Rate field, enter the maximum rate for
5.
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
Select Enable to enable this rule.
6.
After you have set up the rule, click Add to list.
7.
Bandwidth Management
After you have set up the rule, click Add to list.
14.
Set up a rule for Vonage 2. Select Vonage 2 from the
15.
Service drop-down menu.
Enter the IP address or range you need to control. To
16.
include all internal IP addresses, keep the default, 0.
From the Direction drop-down menu, select Upstream
17.
for outbound traffic.
In the Min. Rate field, enter the minimum rate for the
18.
guaranteed bandwidth. For example, you can set a
minimum rate of 40 kbit/sec.
In the Max. Rate field, enter the maximum rate for
19.
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
Select Enable to enable this rule.
20.
After you have set up the rule, click Add to list.
21.
Set up a second rule for Vonage 2 (Downstream). Select
22.
Vonage 2 from the Service drop-down menu.
Enter the IP address or range you need to control. To
23.
include all internal IP addresses, keep the default, 0.
From the Direction drop-down menu, select
24.
Downstream for inbound traffic.
Create Vonage VoIP Rule
Set up a second rule for Vonage VoIP, this time for the
8.
Downstream direction.
Select Vonage VoIP from the Service drop-down
menu.
Enter the IP address or range you need to control. To
9.
include all internal IP addresses, keep the default, 0.
From the Direction drop-down menu, select
10.
Downstream for inbound traffic.
In the Min. Rate field, enter the minimum rate for the
11.
guaranteed bandwidth. For example, you can set a
minimum rate of 40 kbit/sec.
In the Min. Rate field, enter the minimum rate for the
25.
guaranteed bandwidth. For example, you can set a
minimum rate of 40 kbit/sec.
In the Max. Rate field, enter the maximum rate for
26.
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
Select Enable to enable this rule.
27.
After you have set up the rule, click Add to list.
28.
Create Vonage 2 Rule
Click Save Settings.
29.
In the Max. Rate field, enter the maximum rate for
12.
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
Select Enable to enable this rule.
13.
4-Port SSL/IPSec VPN Router
65
Appendix D
Appendix D:
Active Directory Server
NOTE: Windows Server 2000 and 2003 support
the Active Directory server feature.
To configure an Active Directory server:
Click the Start button of your Windows computer.
1.
Click Settings.
2.
Click Control Panel.
3.
Double-click Administrative Tools.
4.
Click Next.
5.
Active Directory Server
Select Domain Controller (Active Directory), and
7.
then click Next.
Server Role
Click Next.
6.
Welcome to the Configure Your Server Wizard
Click Next.
8.
Summary of Selections
Preliminary Steps
4-Port SSL/IPSec VPN Router
66
Appendix D
Click Next.
9.
Welcome to the Active Directory Installation Wizard
Click Next.
10.
Active Directory Server
Select Domain controller for a new domain, and
11.
then click Next.
Domain Controller Type
Select Domain in a new forest, and then click Next.
12.
Operating System Compatibility
4-Port SSL/IPSec VPN Router
Create New Domain
67
Appendix D
Enter a domain name, and then click Next.
13.
New Domain Name
Enter a domain NetBIOS name, and then click Next.
14.
Active Directory Server
Select the folders that will store the Active Directory
15.
database and log. Then click Next.
Database and Log Folders
Enter a location for the SYSVOL folder, and then click
16.
Next.
NetBIOS Domain Name
4-Port SSL/IPSec VPN Router
Shared System Volume
68
Appendix D
Select I will correct the problem later by configuring
17.
DNS manually (Advanced), and then click Next.
DNS Registration Diagnostics
Select Permissions compatible only with Windows
18.
2000 or Windows Server 2003 operating systems.
Then click Next.
Active Directory Server
Enter your Administrator password for the Active
19.
Directory server. Then enter it again in the Confirm password field. Click Next.
The wizard configures Active Directory automatically,
21.
and it notifies you when the configuration is
complete.
Active Directory Installation Wizard
69
Appendix D
Troubleshooting
If your users are unable to connect via Active Directory,
check the following:
The time settings between the Active Directory
•
server and the Router must be synchronized.
Kerberos authentication, used by Active Directory
to authenticate clients, permits a maximum of a 15minute time difference between the Windows server
and the client (the Router).
Make sure that your Windows server is configured
•
for Active Directory authentication. If you are using a
Windows NT 4.0 server, then your server only supports
NT Domain authentication. Typically, Windows 2000
and 2003 servers are also configured for NT Domain
authentication to support legacy Windows clients.
Active Directory Server
4-Port SSL/IPSec VPN Router
70
Appendix E
Appendix E:
User for the Active
Directory Server
NOTE: Windows Server 2000 and 2003 support
the Active Directory server feature.
To create a user for Active Directory:
Click the Start button of your Windows computer.
1.
Click Settings.
2.
Click Control Panel.
3.
Double-click Administrative Tools.
4.
Click Active Directory Users and Computers.
5.
User for the Active Directory Server
Enter the user information in the various name fields.
7.
Enter a User login name, and select the appropriate
domain from the drop-down menu.
Then click Next.
To create a user, right-click Users.
6.
Active Directory Users and Computers
New Object > User > Name
Enter the user password, and enter it again in the
8.
Confirm password field.
Then click Next.
4-Port SSL/IPSec VPN Router
New Object > User > Password
71
Appendix E
Click Finish to create the new user.
9.
New Object > User > Summary
User for the Active Directory Server
4-Port SSL/IPSec VPN Router
72
Appendix F
Appendix F:
Internet Authentication Service (IAS) Server
In the Components section, click Networking
4.
Services. Click Details.
Internet Authentication
Service (IAS) Server
NOTE: Windows Server 2000 and 2003 support
the IAS server feature.
To install an IAS server:
Click the Start button of your Windows computer.
1.
Click Add or Remove Programs.
2.
Click Add/Remove Windows Components.
3.
Select Internet Authentication Service. Click OK.
Then click Next.
Windows Components
Click the Start button of your Windows computer.
5.
Click Settings.
6.
Add or Remove Programs
Click Control Panel.
7.
Double-click Administrative Tools.
8.
Click Internet Authentication Service.
9.
Right-click Remote Access Policies, and click New
10.
Remote Access Policy.
Internet Authentication Service
4-Port SSL/IPSec VPN Router
73
Appendix F
Click Next.
11.
Internet Authentication Service (IAS) Server
To add a policy, click Add.
13.
Welcome to the New Remote Access Policy Wizard
Select Set up a custom policy, and enter a policy
12.
name. Then click Next.
Policy Configuration Method
Policy Conditions
Select Client-IP-Address, and then click Add.
14.
Select Attribute
Enter an IP address, and then click OK.
15.
Enter the Router’s LAN IP address.
4-Port SSL/IPSec VPN Router
Client-IP-Address
74
Appendix F
Make sure a policy has been added, and then click
16.
Next.
Policy Conditions
Select Grant remote access permission, and then
17.
click Next.
Internet Authentication Service (IAS) Server
Click Edit Profile.
18.
Profile
On the Authentication tab, deselect (remove
19.
the checkmark from) Microsoft Encryption
Authentication version 2 and Microsoft Encrypted
Authentication.
Permissions
Select Unencrypted authentication.
Click Apply.
Authentication
4-Port SSL/IPSec VPN Router
75
Appendix F
On the Encryption tab, select Basic encryption,
20.
Strong encryption, Strongest encryption, and No
encryption.
Click Apply.
Internet Authentication Service (IAS) Server
Click Internet Authentication Service.
27.
Internet Authentication Service
Click Finish.
21.
Encryption
Right-click Remote Access Policies, and click New
28.
Connection Request Policy.
Connection Request Policies
Completing the New Remote Access Policy Wizard
Make sure the policy has been added.
22.
Click the Start button.
23.
Click Settings.
24.
Click Control Panel.
25.
Double-click Administrative Tools.
26.
4-Port SSL/IPSec VPN Router
76
Appendix F
Click Next.
29.
Internet Authentication Service (IAS) Server
To add a policy, click Add.
31.
Welcome to the New Connection Request Policy Wizard
Select A custom policy, and enter a policy name. Then
30.
click Next.
Policy Configuration Method
Policy Conditions
Select Client-IP-Address, and then click Add.
32.
Select Attribute
Enter an IP address, and then click OK.
33.
Enter the Router’s LAN IP address.
4-Port SSL/IPSec VPN Router
Client-IP-Address
77
Appendix F
Make sure a policy has been added, and then click
34.
Next.
Policy Conditions
Internet Authentication Service (IAS) Server
On the Authentication tab, select Authenticate
36.
request on this server, and then click OK.
Click Edit Profile.
35.
Request Processing Method
Authentication
Click Finish.
37.
Completing the New Connection Request Processing Policy Wizard
4-Port SSL/IPSec VPN Router
78
Appendix G
Appendix G:
Lightweight Directory
Access Protocol (LDAP)
Server
Access the Router’s web-based utility.
1.
Click the SSL VPN tab.
2.
Click the User Management tab.
3.
From the Authentication Type drop-down menu, select
4.
LDAP.
Lightweight Directory Access Protocol (LDAP) Server
SSL VPN > User Management
In the Server Address field, enter the IP address or
5.
domain name of the server.
In the LDAP BaseDN* field, enter the Base Distinguished
6.
Name defined in the configuration file of your LDAP
server.
NOTE: User names and passwords should be
defined in the configuration file of your LDAP
server. For more information, refer to the
documentation for your LDAP server.
LDAP Settings
Click Save Settings.
7.
4-Port SSL/IPSec VPN Router
79
Appendix H
Appendix H:
Deployment in an Existing
Network
Overview
If you have a current VPN router in your network, you can
add the 4-Port SSL/IPSec VPN Router (model number:
RVL200), so that the SSL clients can access the existing
network resources.
The two configuration examples are for LAN<=>WAN and
LAN<=>LAN, between a 4-Port SSL/IPSec VPN Router and
an existing VPN Router, such as the Linksys 10/100 16-, 8-,
or 4-Port VPN Router (model numbers: RV016, RV082, or
RV042).
LAN<=>WAN
•
The Routers are on different networks (192.168.1.x and
192.168.2.x).
Deployment in an Existing Network
Remove the checkmark from the Enable DHCP Server
4.
setting.
Click Save Settings.
5.
Click the Setup tab.
6.
Click the Advanced Routing tab.
7.
In the Static Routing section, enter 0.0.0.0 in the
8.
Destination IP field.
Enter 0.0.0.0 in the Subnet Mask field.
9.
Enter 192.168.1.1 in the Default Gateway field.
10.
Enter 1 in the Hop Count field.
11.
Select LAN from the Interface drop-down menu.
12.
Click Add to list.
13.
Access the web-based utility of the RV082.
14.
Click the Setup tab.
15.
Click the DMZ Host tab. Configure the RVL200 as the
16.
DMZ Host for the RV082. Enter 192.168.1.2, the IP
address of the RVL200.
LAN<=>LAN
•
The Routers are on the same network (192.168.1x).
LAN-to-LAN Connection
RV082 (Assistant Test Device)
LAN IP: 192.168.1.1
DMZ Host: 192.168.1.2
Port Forwarding: HTTPS
[TCP 443] -> 192.168.1.2
WAN1
LAN
192.168.1.50-54
RVL200 LAN to RV082 LAN
WAN2
LAN
LAN
192.168.1.100-110
RVL200
Device Under Test (DUT)
LAN IP: 192.168.1.2
DHCP Server: Disabled
Click the Forwarding tab.
17.
Select HTTPS[TCP/443~443] from the Service drop-
18.
down menu.
Enter the IP address of the RVL200, 192.168.1.2.
19.
Enable the entry.
20.
Click Add to list.
21.
After an SSL VPN client establishes its connection, the
client can access the existing computers (192.168.1.100-
110) or the servers (192.168.1.50-54) on the RV082 LAN
side.
To connect the RVL200 LAN to the RV082 LAN:
Physically connect a numbered port (Ethernet 1-4) on
1.
the RVL200 to a LAN port on the RV082.
Access the web-based utility of the RVL200. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the DHCP tab.
3.
4-Port SSL/IPSec VPN Router
80
Appendix H
WAN-to-LAN Connection
Remote users with 192.168.1.x
Virtual Passage IP can access the
headquarters’ corporate network
using Virtual Passage via the
WAN IP of the RV082.
Deployment in an Existing Network
RVL200
WAN IP: 192.168.1.2
LAN IP: 192.168.2.1
WAN
Branch Office
RV082
WAN1
WAN2
LAN
Corporate Network
RVL200 WAN to RV082 LAN
Headquarters
RV082
WAN1
WAN2
LAN
Corporate Network
LAN: 192.168.1.100-
192.168.1.200
To connect the RVL200 WAN to the RV082 LAN:
Physically connect the Internet port on the RVL200 to
1.
a LAN port on the RV082.
Configure the Virtual Passage IP so it is in the network
2.
range of the RV082 LAN side.
After an SSL VPN client establishes its connection, the
client can access the existing computers and servers
(192.168.1.100-200) on the RV082 LAN side.
4-Port SSL/IPSec VPN Router
81
Appendix I
Gateway-to-Gateway VPN Tunnel
Appendix I:
Gateway-to-Gateway VPN
Tunnel
Overview
This appendix explains how to configure an IPSec VPN
tunnel between two VPN Routers by example. Two
computers are used to test the liveliness of the tunnel.
Before You Begin
The following is a list of equipment you need:
Two Windows desktop computers (each computer will
•
be connected to a VPN Router)
Two VPN Routers (4-Port SSL/IPSec VPN Router, model
•
number: RVL200, and 10/100 8-Port VPN Router,
model number: RV082) that are both connected to the
Internet
Any VPN Router can be deployed, such as the Linksys
10/100 16-, 8-, or 4-Port VPN Router (model numbers:
RV016, RV082, or RV042); however, this example uses the
RV082.
Configuration of the RVL200
Follow these instructions for the first VPN Router,
designated RVL200. The other VPN Router is designated
the RV082.
Launch the web browser for a networked computer,
1.
designated PC 1.
Access the web-based utility of the RVL200. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address (A.A.A.A) of the RVL200 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RVL200’s local network settings in the IP Address
and Subnet Mask fields.
Configuration when the Remote Gateway
Uses a Static IP Address
This example assumes the Remote Gateway is using a
static IP address. If the Remote Gateway uses a dynamic
IP address, refer to “Configuration when the Remote
Gateway Uses a Dynamic IP Address.”
RV082
WAN: B.B.B.B
LAN: 192.168.1.1
Gateway-to-Gateway IPSec VPN Tunnel - Remote Gateway Using
Static IP
NOTE: Each computer must have a network
adapter installed.
RVL200
WAN: A.A.A.A
LAN: 192.168.5.1
RVL200 IPSec VPN Settings
For the Remote Security Gateway Type, select IP
8.
address. Enter the RV082’s WAN IP address in the IP
Address field.
For the Remote Security Group Type, select Subnet.
9.
Enter the RV082’s local network settings in the IP Address and Subnet Mask fields.
4-Port SSL/IPSec VPN Router
82
Appendix I
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
RVL200 IPSec Setup Settings
Gateway-to-Gateway VPN Tunnel
For the Remote Security Gateway Type, select IP
8.
address. Enter the RVL200’s WAN IP address in the IP
Address field.
For the Remote Security Group Type, select Subnet.
9.
Enter the RVL200’s local network settings in the IP Address and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of the RV082.”
Configuration of the RV082
Follow similar instructions for the RV082.
Launch the web browser for a networked computer,
1.
designated PC 2.
Access the web-based utility of the RV082. (Refer to
2.
the User Guide of the RV082 for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address (B.B.B.B) of the RV082 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV082’s local network settings in the IP Address and Subnet Mask fields.
RV082 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.
Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
RV082 VPN Settings
4-Port SSL/IPSec VPN Router
83
Appendix I
Configuration when the Remote Gateway
Uses a Dynamic IP Address
This example assumes the Remote Gateway is using a
dynamic IP address. If the Remote Gateway uses a static
IP address, refer to “Configuration when the Remote
Gateway Uses a Static IP Address.”
Gateway-to-Gateway VPN Tunnel
RV082
Dynamic IP: B.B.B.B with
Domain Name: www.abc.com
LAN: 192.168.1.1
Gateway-to-Gateway IPSec VPN Tunnel - Remote Gateway Using
Dynamic IP
NOTE: Each computer must have a network
adapter installed.
RVL200
WAN: A.A.A.A
LAN: 192.168.5.1
Configuration of the RVL200
Follow these instructions for the first VPN Router,
designated RVL200. The other VPN Router is designated
the RV082.
Launch the web browser for a networked computer,
1.
designated PC 1.
RVL200 IPSec VPN Settings
For the Remote Security Gateway Type, select IP by
8.
DNS Resolved. Enter the RV082’s domain name in the
field provided.
For the Remote Security Group Type, select Subnet.
9.
Enter the RV082’s local network settings in the IP Address and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
Access the web-based utility of the RVL200. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address (A.A.A.A) of the RVL200 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RVL200’s local network settings in the IP Address
and Subnet Mask fields.
4-Port SSL/IPSec VPN Router
RVL200 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of the RV082.”
Configuration of the RV082
Follow similar instructions for the RV082.
Launch the web browser for a networked computer,
1.
designated PC 2.
Access the Web-based Utility of the RV082. (Refer to
2.
the User Guide of the RV082 for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
84
Appendix I
The WAN IP address (B.B.B.B) of the RV082 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV082’s local network settings in the IP Address and Subnet Mask fields.
Gateway-to-Gateway VPN Tunnel
Configuration when Both Gateways Use
Dynamic IP Addresses
This example assumes both Gateways are using dynamic IP
addresses. If the Remote Gateway uses a static IP address,
refer to “Configuration when the Remote Gateway Uses
a Static IP Address.” If only the Remote Gateway uses a
dynamic IP address, refer to “Configuration when the
Remote Gateway Uses a Dynamic IP Address.”
RV082 VPN Settings
For the Remote Security Gateway Type, select IP
8.
address. Enter the RVL200’s WAN IP address in the IP
Address field.
For the Remote Security Group Type, select Subnet.
9.
Enter the RVL200’s local network settings in the IP Address and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
RV082
Dynamic IP: B.B.B.B with
Domain Name: www.abc.com
LAN: 192.168.1.1
Gateway-to-Gateway IPSec VPN Tunnel - Both Gateways Using
Dynamic IP
NOTE: Each computer must have a network
adapter installed.
RVL200
Dynamic IP: A.A.A.A with
Domain Name: www.xyz.com
LAN: 192.168.5.1
Configuration of the RVL200
Follow these instructions for the first VPN Router,
designated RVL200. The other VPN Router is designated
the RV082.
Launch the web browser for a networked computer,
1.
designated PC 1.
Access the web-based utility of the RVL200. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
RV082 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.
Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
4-Port SSL/IPSec VPN Router
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address (A.A.A.A) of the RVL200 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RVL200’s local network settings in the IP Address
and Subnet Mask fields.
85
Appendix I
RVL200 IPSec VPN Settings
For the Remote Security Gateway Type, select IP by
8.
DNS Resolved. Enter the RV082’s domain name in the
field provided.
For the Remote Security Group Type, select Subnet.
9.
Enter the RV082’s local network settings in the IP Address and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
Gateway-to-Gateway VPN Tunnel
The WAN IP address (B.B.B.B) of the RV082 will be
7.
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV082’s local network settings in the IP Address and Subnet Mask fields.
RV082 VPN Settings
For the Remote Security Gateway Type, select IP by
8.
DNS Resolved. Enter the RVL200’s domain name in
the field provided.
For the Remote Security Group Type, select Subnet.
9.
Enter the RVL200’s local network settings in the IP Address and Subnet Mask fields.
RVL200 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of the RV082.”
Configuration of the RV082
Follow similar instructions for the RV082.
Launch the web browser for a networked computer,
1.
designated PC 2.
Access the Web-based Utility of the RV082. (Refer to
2.
the User Guide of the RV082 for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
RV082 IPSec Setup Settings
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.
Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If the computers
can ping each other, then you know the VPN tunnel is
configured correctly.
4-Port SSL/IPSec VPN Router
86
Appendix J
IPSec NAT Traversal
Appendix J:
IPSec NAT Traversal
Overview
Network Address Translation (NAT) traversal is a technique
developed so that data protected by IPSec can pass
through a NAT. (See NAT 1 and NAT 2 in the diagram.)
Since IPSec provides integrity for the entire IP datagram,
any changes to the IP addressing will invalidate the data.
To resolve this issue, NAT traversal appends a new IP and
UDP header to the incoming datagram, ensuring that no
changes are made to the incoming datagram stream.
This chapter discusses two scenarios. In the first scenario,
traffic is sent in one direction, through Router A, NAT 1,
NAT 2, and Router B. In the second scenario, traffic is sent
in the opposite direction, and a one-to-one NAT rule is
required.
Before You Begin
The following is a list of equipment you need:
Two 4-Port SSL/IPSec VPN Routers (model number:
•
RVL200), one of which is connected to the Internet
Configuration of Scenario 1
In this scenario, Router A is the RVL200 Initiator, while
Router B is the RVL200 Responder.
WAN: 192.168.11.101
Router A - RVL200 Initiator
LAN: 192.168.1.0/24
WAN: 192.168.99.22
Router B - RVL200
Responder
LAN: 192.168.2.0/24
192.168.2.100
Two 10/100 4-Port VPN Routers (model number:
•
RV042), one of which is connected to the Internet
192.168.1.101
Traffic in Scenario 1
NOTE: Both the IPSec initiator and responder
must support the mechanism for detecting the
NAT router in the path and changing to a new
port, as defined in RFC 3947.
Configuration of Router A
Follow these instructions for Router A.
Launch the web browser for a networked computer,
1.
designated PC 1.
Access the web-based utility of Router A. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
4-Port SSL/IPSec VPN Router
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
87
Appendix J
The WAN IP address of Router A will be automatically
7.
detected.
For the Local Security Group Type, select Subnet. Enter
Router A’s local network settings in the IP Address and
Subnet Mask fields.
Router A’s IPSec VPN Settings
For the Remote Security Gateway Type, select IP
8.
address. Enter Router B’s WAN IP address in the IP
Address field.
For the Remote Security Group Type, select Subnet.
9.
Enter Router B’s local network settings in the IP Address
and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
IPSec NAT Traversal
Router B’s IPSec VPN Settings
For the Remote Security Gateway Type, select IP Only.
8.
Enter the WAN IP address of NAT 2 - RV042 in the IP Address field.
For the Remote Security Group Type, select Subnet.
9.
Enter Router A’s local network settings in the IP Address
and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of Router B.”
Configuration of Router B
Follow these instructions for Router B.
Launch the web browser for a networked computer,
1.
designated PC 2.
Access the web-based utility of the Router B. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address of Router B will be automatically
7.
detected.
For the Local Security Group Type, select Subnet. Enter
Router B’s local network settings in the IP Address and
Subnet Mask fields.
4-Port SSL/IPSec VPN Router
88
Appendix J
IPSec NAT Traversal
Configuration of Scenario 2
In this scenario, Router B is the RVL200 Initiator, while
Router A is the RVL200 Responder. Router B will have
the Remote Security Gateway IP address set to a public
IP address that is associated with the WAN IP address of
Router A, which is behind the NAT. Hence the public IP
address (192.168.99.1) must be mapped to the WAN IP
address (192.168.11.101, a private IP address) of Router A
through the two one-to-one NAT rules:
WAN: 192.168.99.22
Router B - RVL200
Initiator
LAN: 192.168.2.0/24
192.168.2.100
Configuration of the One-to-One NAT Rules
The one-to-one NAT rules must be configured on
NAT 2 - RV042 and NAT 1 - RVO42.
One-to-One NAT Rule on NAT 2 - RV042
192.168.99.1 => 192.168.111.11
Refer to the documentation of the 10/100 4-Port VPN
Router (model number: RV042) for more details about
one-to-one NAT rules.
One-to-One NAT Rule on NAT 1 - RV042
192.168.111.11 => 192.168.11.101
Configuration of Router B
Set the Remote Security Gateway to IP address:
192.168.99.1, which is the one-to-one NAT IP address used
by NAT 2 - RV042.
Follow these instructions for Router B.
Launch the web browser for a networked computer,
1.
designated PC 2.
Access the web-based utility of the Router B. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
WAN: 192.168.11.101
Router A - RVL200 Responder
LAN: 192.168.1.0/24
192.168.1.101
Traffic in Scenario 2
NOTE: Both the IPSec initiator and responder
must support the mechanism for detecting the
NAT router in the path and changing to a new
port, as defined in RFC 3947.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address of the Router B will be automatically
7.
detected.
For the Local Security Group Type, select Subnet. Enter
Router B’s local network settings in the IP Address and
Subnet Mask fields.
For the Remote Security Gateway Type, select IP
8.
address. Enter 192.168.99.1 in the IP Address field.
Router B’s IPSec VPN Settings
4-Port SSL/IPSec VPN Router
89
Appendix J
For the Remote Security Group Type, select Subnet.
9.
Enter Router A’s local network settings in the IP Address
and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of Router A.”
Configuration of Router A
Follow these instructions for Router A.
Launch the web browser for a networked computer,
1.
designated PC 1.
IPSec NAT Traversal
For the Remote Security Group Type, select Subnet.
9.
Enter Router B’s local network settings in the IP Address
and Subnet Mask fields.
In the IPSec Setup section, select the appropriate
10.
encryption, authentication, and other key management
settings.
In the Preshared Key field, enter a string for this key, for
11.
example, 13572468.
If you need more detailed settings, click Advanced
12.
Settings. Otherwise, click Save Settings.
Access the web-based utility of Router A. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)
Click the IPSec VPN tab.
3.
Click the Gateway to Gateway tab.
4.
Enter a name in the Tunnel Name field.
5.
For the VPN Tunnel setting, select Enable.
6.
The WAN IP address of Router A will be automatically
7.
detected.
For the Local Security Group Type, select Subnet. Enter
Router A’s local network settings in the IP Address and
Subnet Mask fields.
Router A’s IPSec VPN Settings
NOTE: This configuration is the same as the
configuration of Router A in scenario 1.
For the Remote Security Gateway Type, select IP
8.
address. Enter Router B’s WAN IP address in the IP
Address field.
4-Port SSL/IPSec VPN Router
90
Appendix K
Configuration of Multiple Subnets
Appendix K:
Configuration of Multiple
Subnets
Overview
The 4-Port SSL/IPSec VPN Router (model number: RVL200)
can support multiple subnets. The configuration example
shows an RVL200 deploying two routers.
Any router can be deployed; however, this example uses
the Linksys 10/100 4-Port VPN Router (model number:
RV042).
RVL200
LAN IP: 192.168.1.1
Multiple Subnet
IP: 192.168.7.0/24
Multiple Subnet
IP: 192.168.20.0/24
RVL200-to-RV042 Configuration
To create this configuration, you create two subnets and
two static routes on the RVL200. Then on each RV042, you
set it to Router mode, disable the firewall, and set up a
static route.
RVL200 Configuration
Physically connect a numbered port (Ethernet 1-4) on
1.
the RVL200 to the WAN 1 port of the RV042.
Access the web-based utility of the RVL200. (Refer to
2.
“Chapter 4: Advanced Configuration” for details.)